ISACA Now Blog

 Filters

 ‭(Hidden)‬ Admin Links

Knowledge & Insights > ISACA Now

Tightening Cybersecurity Assurance in Supply Chains: Three Essentials

Phil Zongo and Rohini Kuttysankaran Nair
Posted: 12/13/2018 3:05:00 PM | Category: Audit-Assurance | Permalink | Email this post

Phil Zongo and Rohini Kuttysankaran NairIn October 2018, Bloomberg Businessweek sent shivers through the business and intelligence community when it published an astonishing report that claimed that Chinese spies had exploited vulnerabilities in the US technology supply chain, infiltrating computer networks of almost 30 prominent US companies, including Apple, Amazon.com Inc., a major bank, and government contractors.

 
Read More >>
    

What is Driving Growth for AR/VR?

Kris Kolo, Global Executive Director, VR/AR Association
Posted: 12/12/2018 3:09:00 PM | Category: Risk Management | Permalink | Email this post

Kris KoloGartner’s recent list of top tech trends for 2019 included immersive experiences, which they described as follows:

“Conversational platforms are changing the way in which people interact with the digital world. Virtual reality (VR), augmented reality (AR) and mixed reality (MR) are changing the way in which people perceive the digital world. This combined shift in perception and interaction models leads to the future immersive user experience."

 
Read More >>
    

COBIT 2019 is Our Framework and a Framework for Us

Graciela Braga, CGEIT, Auditor and Advisor, Argentina
Posted: 12/11/2018 9:58:00 AM | Category: COBIT-Governance of Enterprise IT | Permalink | Email this post

Graciela BragaI love COBIT. Why? To begin with, COBIT is useful and usable. Secondly, the newly updated framework combines community knowledge and flexibility.

The What Is COBIT and What Is It Not section from COBIT 2019 Framework: Introduction and Methodology is very clear, and demonstrates how useful and usable the updated version of COBIT will be.

COBIT users know that COBIT in its last two versions utilized the components (formerly enablers) to plan, build and maintain a governance system. They were and are principles, policies and procedures, processes, organizational structures, information flows, culture and behaviors, skills, and infrastructure.

 
Read More >>
    

Ryan Envisions ‘Very Positive’ Future for Women in Cybersecurity

ISACA Now
Posted: 12/7/2018 3:02:00 PM | Category: ISACA | Permalink | Email this post

Editor’s note: Pat Ryan’s wide-ranging career included serving as an analyst in the British intelligence community, partnering with her husband on an oil exploration consultancy specializing in underwater seismic operations and satellite imaging, setting up and running a non-profit that installed IT equipment and educational software into UK hospitals where children were being treated, and founding Cyber Girls First, which encourages girls in the UK to take up coding and cybersecurity. Ryan, who spoke last month at ISACA’s UK Chapters conference, recently visited with ISACA Now to share about her past experiences and current efforts to inspire girls in cybersecurity. The following is a transcript of the interview, edited for length and clarity:

 
Read More >>
    

Envisioning the 2019 Cybersecurity Landscape

Ravikumar Ramachandran, Account Security Officer, DXC Technology, India, CISA, CISM, CGEIT, CRISC, CISSP-ISSAP, SSCP, CAP, PMP, CIA, CRMA, CFE, FCMA, CFA, CEH, ECSA, CHFI, MS (Fin), MBA (IT), COBIT-5 Implementer, Certified COBIT Assessor,  ITIL-Expert & Practitioner
Posted: 12/5/2018 3:06:00 PM | Category: Security | Permalink | Email this post

Ravikumar RamachandranNow that we are nearing the end of the year, I thought I would revisit my own write-up on 2018 cybersecurity predictions and see how I can best update them for 2019. The acceleration of rapid digitization and the inter-networked world led to a huge data explosion, which, combined with the relentless growth of transformative technologies, underscores the importance of cybersecurity much more than even last year.

Therefore for 2019, my top five predictions for major cybersecurity trends remain largely the same as for 2018, but only with more emphasis and, interestingly, with more corroborating evidence.

 
Read More >>
    
<< First   < Previous     Page: 1 of 213     Next >   Last >>

 About This Blog

 

This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.

The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.

Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.

   

To volunteer to write a blog or suggest a topic send an email here.