Listen to experts in cyber security, audit, governance and more as they explain the latest trends and issues facing professionals. Subscribe to the ISACA Podcast on iTunes, Google Play or SoundCloud.
 

Podcast Featured Podcast

New!  SheLeadsTech Series: Mentors and Role Models in the Tech Workforce
A shortage of role models was cited in ISACA research as one of the roadblocks for women in the tech workforce. In this podcast, we discuss some of the steps both women and men can take to empower female practitioners and enhance gender diversity.

 

Podcast 2018 Podcasts


SheLeadsTech Series: Mentors and Role Models in the Tech Workforce

ISACA Journal Volume 2:  Applying a Technological Integration Decision Framework to Innovation Governance  (View Article)

Reasonable Software Security Engineering  (View Perspectives Article)

ISACA Journal Volume 2:  Disaster Recovery Management in the Multimodal Era  (View Article)

ISACA Journal Volume 1:  Managing Availability in the Multi-Modal Era  (View Article)

ISACA Journal Volume 1:  Mistakes Happen—Mitigating Unintentional Data Loss  (View Article)

Meltdown and Spectre Vulnerabilities


Podcast 2017 Podcasts


ISACA Journal Volume 6:  Governance, Risk, Compliance and a Big Data Case Study  (View Article)

ISACA Journal Volume 5:  Anatomy of an IoT DDoS Attack and Potential Policy Responses  (View Article)

ISACA Journal Volume 5:  Information Security in the Multi-Modal Era  (View Article)

ISACA Journal Volume 4:  Social Media Rewards and Risk  (View Article)

Sustainability (View White Paper)

Implementing the NIST Cyber Security Framework (View White Paper)

COBIT 5 Principles: Where Did They Come From? (View White Paper)

ISACA Journal Volume 1:  The Automation Conundrum  (View Article)


Podcast 2016 Podcasts


ISACA Journal Volume 6:  Performance Measurement Metrics for IT Governance  (View Article)
ISACA Journal Volume 6:  The G7 and Cyber Security  (View Article)

ISACA Journal Volume 5:  Unsung Security Heroes  (View Article)
ISACA Journal Volume 5:  Balancing the Cybersecurity Battlefield  (View Article)

ISACA Journal Volume 4:  Chief Cyber Officer  (View Article)
ISACA Journal Volume 4:  Benefits and the Security Risk of Software-defined Networking  (View Article)

ISACA Journal Volume 3:  Challengeable Truths  (View Article)
ISACA Journal Volume 3:  Protecting Information—Practical Strategies for CIOs and CISOs  (View Article)

ISACA Journal Volume 2:  Weary Willie’s Guide to Cyberrisk Management  (View Article)
ISACA Journal Volume 2:  Auditing Agile—A Brave New World Podcast  (View Article)

ISACA Journal Volume 1:  Why Everyone Dislikes the IT Auditor and How to Change It  (View Article)
ISACA Journal Volume 1:  Cyber/Privacy  (View Article)


Podcast 2015 Podcasts


ISACA Journal Volume 6:  Cybersecurity for a “Simple” Auditor   (View Article)
ISACA Journal Volume 6:  The Criticality of Security in the Internet of Things  (View Article)

ISACA Journal Volume 5:  Stanley Baldwin’s Bomber  (View Article)
ISACA Journal Volume 5:  Addressing Cybersecurity Vulnerabilities  (View Article)

ISACA Journal Volume 4:  Are Software Flaws a Security Problem?  (View Article)
ISACA Journal Volume 4:  Three Ways to Simplify Auditing Software Security Requirements and Design  (View Article)

ISACA Journal Volume 3:  Frameworkers of the World, Unite II  (View Article)

ISACA Journal Volume 2:  Cyberwhatsit  (View Article)

ISACA Journal Volume 1:  Microwave Software  (View Article)