ISACA Now Blog


 ‭(Hidden)‬ Admin Links

Knowledge & Insights > ISACA Now

ISACA’s Future Brimming With Opportunity

Brennan P. Baybeck, CISA, CISM, CRISC, CISSP, Chair of ISACA board and Vice President - Customer Support Services Security Risk Management for Oracle Corporation
Posted: 6/17/2019 9:57:00 AM | Category: ISACA | Permalink | Email this post

Brennan P. BaybeckAs my relationship with ISACA unfolded through various volunteer roles for the past 25 years, I have had the privilege of seeing the organization evolve – through good times and challenging times – just as many of us have experienced in our personal lives and careers.

I’ve stayed with ISACA for the long haul because regardless of the hot technology or top-of-mind regulation of the day, I have consistently been proud to serve a global organization that provides the resources needed to advance business technology professionals’ careers and strengthen the technology workforce, while addressing some of the biggest challenges in our industry.


Drive Your Own Destiny in Achieving Goals

Adam Kohnke, Senior IT Auditor
Posted: 6/14/2019 3:23:00 PM | Category: Audit-Assurance | Permalink | Email this post

Adam KohnkeAn individual would be hard-pressed to debate that behaviors and habits individuals exercise in their personal lives have no bearing or effects on their professional career. To that end, the ability to visualize, establish and pursue goals is a useful tool to realizing our personal desires, both personally and professionally. This blog post will provide some insight on basic, but useful, practices that individuals may adopt to help them start setting and achieving relevant goals, as well as explore common problems individuals run into with setting goals, with examples of how to overcome those problems and achieve what they desire.


Rethinking Cost Analysis in the Era of Cloud Computing and Emerging Tech

Katsumi Sakagawa, CISA, CRISC, IT consultant
Posted: 6/12/2019 3:01:00 PM | Category: Audit-Assurance | Permalink | Email this post

Katsumi SakagawaHave you thought about cost analysis in the era of cloud operation, combined with other emerging technologies? There is an orthodox way of considering cost analysis: Costs can be fixed, variable or some combination of the two. However, when it comes to analyzing IT costs, traditional cost analysis in the era of emerging technologies is inadequate.

The entire cost element must be taken into account: from where the cost occurs to what the cost consumes. An enterprise not only has to consider emerging technologies, but also has to consider the current legacy system. An inevitable, necessary cost exists in the file service required to produce what an enterprise needs.


A Look at CIS Controls Version 7.1

K. Harisaiprasad CISA, APP, Associate Consultant, Mahindra SSG, India     
Posted: 6/10/2019 2:58:00 PM | Category: Security | Permalink | Email this post

K. HarisaiprasadCIS Controls Version 7.1, released in April 2019, was developed by Center for Internet Security (CIS), which consists of a community of IT experts. CIS Controls has a set of 20 prioritized controls, divided into three categories as basic, foundational and organizational, which are also termed as Implementation Group (IG) IG1, basic; IG2 – IG1, foundational; and IG3 – IG2, organizational.

The basic category consists of controls for the inventory and control of hardware assets, inventory and control of software assets, continuous vulnerability management, controlled use of admin rights, and the secure configuration for hardware and software on mobile devices, laptops, workstations and servers.


ISACA at Infosecurity Europe: Expert Speakers and New Research at Europe’s Largest Infosec Event

Posted: 6/7/2019 12:07:00 PM | Category: Security | Permalink | Email this post

ISACA expert speakers, past board directors and chapter leaders provided insight and new research while ISACA representatives highlighted ISACA certifications and training solutions at Infosecurity Europe 2019, 4-6 June in London. With more than 400 exhibitors and 240 educational sessions, the annual exposition and conference attracts the largest infosec and cybersecurity crowd in the region.

Vilius Benetis, president of the ISACA Lithuania chapter and CEO at NRD Cyber Security, presented twice at Infosecurity Europe: “Building or Modernising Own CSIRT/SOC: Practical Tips” and “National or Sectorial Cybersecurity Capability Build-Out: Capability Assessments, CSIRT/SOCs, Threat Landscapes & CIIs.” Benetis shared that if organizations have sensitive data, heavily automated processes, or are part of critical infrastructure, establishing a computer security incident response team (CSIRT) or a security operations center (SOC) will ensure they are ready to respond to threats with internationally accepted incident response methodology.

<< First   < Previous     Page: 1 of 232     Next >   Last >>

 About This Blog


This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.

The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.

Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.


To volunteer to write a blog or suggest a topic send an email here.