ISACA Digital Videos
Experience ISACA through our lens. Explore our educational content, ISACA news and events, in-depth interviews with experts in cybersecurity, IT audit, governance and so much more, plus a link to ISACA’s audio podcast—all right here. Press play and you are on your way.
A View into CTEM Exposure Management: Reducing your Attack Surface 3x
841 Views • 2 years ago
Trending Videos
Securing Data in the Age of AI with DSPM: Lessons from a High-Impact ISACA Webinar 179 Views • 1 month ago
Our Biggest Scholarship Year Yet: Celebrating Our 2025 Scholars! 65 Views • 25 days ago
Capability Creates 2026 | Where CMMI, Government & Innovation Converge 114 Views • 1 month ago
What ISACA Members Want to Learn in the New Year 144 Views • 2 months ago
Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability management, security around misconfigurations, patching, identity, software, external attack surfaces, and more must be included. In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains that an organization can prevent breaches and ransomware by taking an asset-centric prioritized-security approach that includes all of these security areas.
View More
