ISACA Now Blog

 Filters

 ‭(Hidden)‬ Admin Links

Knowledge & Insights > ISACA Now

How Cybersecurity Can Better Support Digital Transformation Business Goals

Sandy Silk, CISSP, Cyber Risk & Resilience Consulting and Harvard University Information Security Director
Posted: 8/22/2019 3:00:00 PM | Category: Security | Permalink | Email this post

Sandy SilkConsumers are demanding we offer outstanding user experiences and technology interfaces, and we need to strategize how we both safeguard and leverage ever-growing portfolios of data and systems to differentiate ourselves from our competitors. Yet, often our cybersecurity programs and business goals seem to be at odds. Digital transformation (DX) strives to provide outstanding customer experience, personalization, convenience, agility, and cost savings. None of these are traits most organizations would ascribe to their cybersecurity team! I offer below some high-level guidance to bring cybersecurity closer to DX goals.

 
Read More >>
    

Exploring COBIT 2019’s Value for Auditors

Dirk Steuperaert, IT & Risk Governance Consultant
Posted: 8/21/2019 3:00:00 PM | Category: COBIT-Governance of Enterprise IT | Permalink | Email this post

Dirk SteuperaertCOBIT 2019 is a terrific resource for a wide range of business technology professionals. In ISACA's 19 September 2019 Professional Guidance webinar (free registration), “COBIT 2019 – Highly Relevant for Auditors,” we will focus on assurance professionals and the benefits they can obtain from COBIT 2019.

For that purpose, we will first quickly revisit the key COBIT 2019 concepts. We will then discuss the features of COBIT 2019 that are most relevant for auditors, such as the design factors and design guide, the governance and management objectives, and the new process capability scheme.

 
Read More >>
    

In the Age of Cloud, Physical Security Still Matters

Sourya Biswas, Principal Security Consultant, NCC Group
Posted: 8/19/2019 1:19:00 PM | Category: Cloud Computing | Permalink | Email this post

Sourya BiswasAs a security consultant, I’ve had the opportunity to assess the security postures of clients of all shapes and sizes. These enterprises have ranged in sizes from a five-man startup where all security (and information technology) was being handled by a single individual to Fortune 500 companies with standalone security departments staffed by several people handling application security, vendor security, physical security, etc. This post is based primarily on my experiences with smaller clients.

Cloud computing has definitely revolutionized the way companies do business. Not only does it allow companies to focus on core competencies by outsourcing a major part of the underlying IT infrastructure (and associated problems), it also allows for the conversion of heavy capital expenditure into scalable operational expenses that can be turned up or down on demand. The latter is especially helpful for smaller companies that can now access technologies that before had only been available to enterprises with million-dollar IT budgets.

 
Read More >>
    

The Film Industry and IT Security

Barbara N. Wabwire, CISA, MBA, BIT, Business IT Consultant
Posted: 8/16/2019 2:59:00 PM | Category: Security | Permalink | Email this post

Barbara WabwireFor those in the ISACA community who are fans of popular culture, you might have noticed in recent years that, in many cases, film and TV stars are beginning to look more like you and I, and less like the muscle men of our youths.

Movie and TV producers have long been interested in technology – from the times of single action heroes like the one-man army of John Rambo in “First Blood” and Arnold Schwarzenegger as a cyborg assassin in “Terminator,” the film industry has been at it. But as the work performed by IT security practitioners has become more central not only to all enterprises but to society as a whole, it has been interesting to see how that realization is filtering into the big (and small) screens.

 
Read More >>
    

Ethical Considerations of Artificial Intelligence

Lisa Villanueva, Technical Research Manager, ISACA
Posted: 8/15/2019 9:58:00 AM | Category: Risk Management | Permalink | Email this post

Lisa VillanuevaHave you ever stopped to consider the ethical ramifications of the technology we rely on daily in our businesses and personal lives? The ethics of emerging technology, such as artificial intelligence (AI), was one of many compelling audit and technology topics addressed this week at the 2019 GRC conference.

In tackling this topic in a session titled “Angels or Demons, The Ethical Considerations of Artificial Intelligence,” session presenter Stephen Watson, director of tech risk assurance at AuditOne UK, first used examples to define the different forms of AI. For example, it was initially thought a computer could not beat a human at a game of chess or Go in the early stages of AI. Many were fascinated to find that indeed the computer could be programmed to achieve this goal. This is an example of Narrow or Weak AI where the computer can outperform humans at a specific task.

 
Read More >>
    
<< First   < Previous     Page: 1 of 240     Next >   Last >>

 About This Blog

 

This blog is intended to offer a way for ISACA leaders, constituents and staff to exchange information of interest pertinent to the association, the business environment and/or the profession.

The comments on this site are the author’s own and do not necessarily represent ISACA’s opinions or plans. ISACA does not endorse, monitor or control any links to external sites offered in this blog, and makes no warranty or statement regarding the content on those external sites.

Anyone posting comments on this site should ensure that the content remains on-topic and steers well clear of any statements that could be considered insensitive, offensive or threatening. Given ISACA’s global nature, the need to communicate in a way that is accessible and acceptable to many cultures should be taken into account. ISACA retains the right, at its sole discretion, to refuse content that is considered inappropriate.

   

To volunteer to write a blog or suggest a topic send an email here.