ISACA Now Blog


 ‭(Hidden)‬ Admin Links

Knowledge & Insights > ISACA Now

Lower IT Department Expenses Without Compromising on Security

Anna Johannson, Writer Posted: 6/22/2018 2:59:00 PM | Category: Security | Permalink | Email this post

Anna JohannsonThe IT department has risen to prominence as one of the more integral components of successful, modernized organizations. However, in the midst of this growth, IT has also become increasingly expensive for many of these companies. Discovering what it looks like to manage a cost-effective IT department could be the difference between running a profitable business and straining to make ends meet. 

Three Highly Effective Ways to Lower IT Expenses
According to an article coauthored by consultant Kevin Coyne in Harvard Business Review, there are two key points to keep in mind whenever you pursue cost savings, regardless of the organization or department.


AI: the Challenge and the Solution

Posted: 6/21/2018 3:07:00 PM | Category: ISACA | Permalink | Email this post

P.W. SingerEditor’s note: P.W. Singer, strategist and senior fellow at the New America Foundation, will deliver the closing keynote address at ISACA’s 2018 CSX North America conference, to take place 15-17 October in Las Vegas, Nevada, USA. Singer recently visited with ISACA Now to discuss pressing cybersecurity considerations that governments much grapple with, the multi-faceted impact of artificial intelligence and more. The following is a transcript of the interview, edited for length and clarity:


CISA Payoff: Immediate and Enduring Throughout My Career

Walt Blackwood, CISA, COL(R) USAR, Senior Director, IT Audit, Internal Audit, TIAA | Financial Services
Posted: 6/19/2018 9:01:00 AM | Category: Certification | Permalink | Email this post

Walt BlackwoodThe Certified Information Systems Auditor (CISA) certification has truly benefited my professional aspirations.

In 1997, when I transitioned from active duty as a Captain in the US Army, I had a 10-year-old computer science degree and not a great deal of experience in corporate America, particularly in the financial services industry. The extent of my background at that time was having an IRA. Fortunately, I was able to gain an entry level position as an IT Auditor at Prudential Insurance Company of America (now Prudential Financial) in Newark, New Jersey, through their junior military officer (JMO) hiring program.


IT Audit Co-sourcing Requires a Strategic Touch

Mais Barouqa, CISA, CRISC, COBIT 5 Foundation, ISO, ITIL, GRCP, Assistant Manager - IT Risk and Assurance, Deloitte M.E. 
Posted: 6/18/2018 3:02:00 PM | Category: Audit-Assurance | Permalink | Email this post

Mais BarouqaThe 7th annual IT Audit Benchmarking Survey shed light on several IT challenges that are at the top of the agenda for executive management and will have a direct impact on IT audit plans for many enterprises in 2018.

While the survey highlighted several key challenges, I will be drilling more in-depth into one key aspect, which is the co-sourcing of IT audit. Within the survey, it was noted that IT audit’s role has grown since 2012, in that half of all organizations now have a designated IT audit director. Such growth emphasizes the importance of the IT audit role. Given the current technological advancements, IT audit plans are required to be aligned and inclusive of the risks that accompany them. That not only requires a different set of skills that are needed in order to have value-added audit results, but also requires internal management to reconsider their IT audit plans.


Is the NIST Cybersecurity Framework Enough to Protect Your Organization?

Baan Alsinawi, President and founder of TalaTek
Posted: 6/15/2018 2:59:00 PM | Category: Security | Permalink | Email this post

Baan AlsinawiThe National Institute of Standards and Technology (NIST) Cybersecurity Framework, also known as the Framework for Improving Critical Infrastructure Cybersecurity and commonly referred to as CSF, is top of mind for many organizations.

Whether driven by the May 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, the need for a common framework between business partners or as a way to measure best practices, many organizations are considering adopting NIST’s framework as a key component of their cybersecurity strategy.

<< First   < Previous     Page: 1 of 196     Next >   Last >>

 About This Blog


This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.

The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.

Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.


To volunteer to write a blog or suggest a topic send an email here.