journal header

Volume 2, 2019

This Week's Online-Exclusive Feature

Implementing a Cybersecurity Culture

Implementing a Cybersecurity Culture
20 March 2019
Luis Emilio Alvarez-Dionisi, Ph.D. and Nelly Urrego-Baquero

Culture is an important topic that has been studied by anthropologists and sociologists for years.

However, culture currently has the attention of senior management and many IT and auditing enterprises across the world, due to increasing online business (e.g., cloud-based services and e-commerce), market globalization and constantly evolving Internet technologies.

Enterprises are facing culture challenges every day. For example, consider a fictional enterprise that recently promoted its New York City (New York, USA) director of IT auditing to chief information security officer (CISO) for the Indian subcontinent. Read More >>

Indicates Online-Exclusive Content

 

 


Podcast  New!
ISACA Journal Volume 1 Podcast

The Road to GDPR Compliance


View More Podcasts >>

This Week's Featured Blog

How to Ensure Data Privacy and Protection Through Ecosystem Integration
25 February 2019
Dave Brunswick

My recent ISACA Journal article, “Data Privacy, Data Protection and the Importance of Integration for GDPR Compliance,” describes how the movement and processing of personal data, along with the procedures around those workflows, are central to General Data Protection Regulation (GDPR) compliance. Here are actionable steps enterprises can take to implement a modern integration strategy that ensures both data protection and data privacy.

Ensure Data Protection
The keys to ensuring enterprise data protection through a combination of tools and policy include:

  • PGP encryption—Apply Pretty Good Privacy (PGP) encryption standards for data in motion and data at rest, and control the keys.

Read More >>

Indicates Online-Exclusive Content

 

 


What's New for Nonmembers

IS Audit Basics Articles

Auditing Cybersecurity

Assurance Considerations for Ongoing GDPR Conformance

Affect What Is Next Now

Auditing the IoT

Add Value to What Is Valued

Auditing Data Privacy

 

Full Journal Issues

Volume 2, 2018 Innovation Governance

Volume 1, 2018 The Future of Data Protection

Volume 6, 2017 Transforming Data

Volume 5, 2017 Enabling the Speed of Business

Volume 4, 2017 Mobile Workforce

Volume 3, 2017 The Internet of Things


Sponsored Feature Articles

Why Security Product Investments Are Not Working

Why Attackers Are Turning Their Attention Toward ERP Applications

Innovating Internal Audit to Unlock Value

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization