journal header

Volume 1, 2019

This Week's Online-Exclusive Feature

HelpSource Q&A

HelpSource Q&A
20 February 2019

Question  As the CISO of my organization, I am facing a problem I have not encountered before. We are finding it difficult to hire security staff with appropriate skills. How can we resolve this problem?

Answer  It is not a unique problem, but a universal one. Many organizations have encountered this, and there is data to confirm it. ISACA’s State of Cybersecurity 2018 report supports this finding:

The skills gap continues unabated. Enterprises still have open security positions, and the time to fill them appears to have decreased slightly. Demand is greatest for skilled technical resources at the individual-contributor level, rather than the management or executive level. For job seekers, technical skills are a strong differentiator.

In addition to this report, many other surveys have pointed out that getting properly skilled people for managing cybersecurity is a challenge today, as the unemployment rate for security professionals is zero. Read More >>

Indicates Online-Exclusive Content



This Week's Featured Blog

Getting Your GDPR Compliance Program Into Gear With Proper Record Keeping
18 February 2019
Corlane Barclay, Ph.D., PMP

Compliance procedures are notoriously demanding, and European Union General Data Protection Regulation (GDPR) compliance programs are no different. My recent Journal article underlined some of the challenges that may be experienced by organizations as they try to meet GDPR requirements and introduced a series of steps that organizations can take to help them in their GDPR compliance journey.

Arguably, one of the integral first steps is developing and maintaining a record of processing activities undertaken by the organization. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Assurance Considerations for Ongoing GDPR Conformance

Affect What Is Next Now

Auditing the IoT

Add Value to What Is Valued

Auditing Data Privacy

Innovation in the IT Audit Process


Full Journal Issues

Volume 1, 2018 The Future of Data Protection

Volume 6, 2017 Transforming Data

Volume 5, 2017 Enabling the Speed of Business

Volume 4, 2017 Mobile Workforce

Volume 3, 2017 The Internet of Things

Volume 2, 2017 The Evolution of Audit

Sponsored Feature Articles

Why Attackers Are Turning Their Attention Toward ERP Applications

Innovating Internal Audit to Unlock Value

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization