News & Trends

Privileged Access Management and Implementing It Smartly
Practically Speaking | View blog

Remembering My Friend and Mentor: 1984-1985 ISACA Board Chair John Lainhart
ISACA Now | View blog

Understanding the 8 Data-Related Rights of GDPR-Based Subject Data
@ISACA | Subscribe

Effective Interactive Privileged Access Review
ISACA Journal | Subscribe

GEIT Framework at Work, Part 4: Outlining the Work Products
COBIT Focus | Subscribe

Cloud Insecurity: The Need for Stronger Identity Management
The Nexus | Subscribe


State of Cybersecurity 2018
> More on Cybersecurity

Internal Control Using COBIT 5 video
> More on Governance/COBIT

Understanding Smart Contracts
> More on Research/Emerging Technologies

2018 IT Audit Leaders Summit Recap
Auditing and Knowledge Management
Transport Layer Security 
> View all white papers

Implementing a Privacy Protection Program: Using COBIT 5 Enablers With the ISACA Privacy Principles
> More on Privacy


Implementing the General Data Protection Regulation
Maintaining Data Protection and Privacy Beyond GDPR Implementation
> View GDPR resources

ISACA Tech Brief: The Darknet

Bring Your Own Device (BYOD) Security Audit/Assurance Program

CIS Controls Audit/Assurance Program

Application Container Audit/Assurance Program
> View all Audit/Assurance programs

Information Systems Auditing: Tools and Techniques — Creating Audit Programs
> More on Audit/Assurance

Infographic: What is Geolocation and How Does It Work?
> View Geolocation resources



Inspire IT innovation and fuel business success with COBIT 5,
the framework for the governance and management
of enterprise IT. More >>


Discover the latest jobs,
top-of-mind industry news, events and employment trends. Navigating a successful career in the IS industry made easy. More >>


Take advantage of ISACA member-exclusive, gold-standard insights from content partners. More >>


Find resources, discuss
best practices and connect
with members on topics that
interest you. More >> 


Explore research that results
in products that IT governance,
control, audit, risk and security professionals can use to add value to their enterprises. More >>


Study for certification
examinations or simply learn
new industry definitions
and phrases with ISACA's
interactive glossary. More >>