journal header

Volume 2, 2018

This Week's Online-Exclusive Feature

Digital Ethics and the Blockchain

Digital Ethics and the Blockchain
14 March 2018
Dan Blum, CISSP

How the digital transformation turns out may depend on how well it supports core values such as prosperity, fairness, integrity, transparency and privacy atop an Internet that erodes some of these values.

Many hope platforms built on blockchains will improve online ethics by providing the Internet’s missing trust layer.

Blockchain Primer
A blockchain is a form of digital ledger that records and widely distributes transactions while offering strong provisions for data integrity and availability. Different types exist. Some (such as Bitcoin’s) are highly decentralized, while others (such as the R3 Corda) are controlled by private industry groups. All promise to enable previously risk-prohibitive use cases. Read More >>

Indicates Online-Exclusive Content



This Week's Featured Blog

How to Prioritize Security Controls Implementation
12 March 2018
Rassoul Ghaznavi-Zadeh, CISM, COBIT Foundation, CISSP, SABSA SCF, TOGAF 9

When developing an information security architecture framework in a new organization, there are a few steps that normally have to be taken to identify the business requirements, the right framework and the controls needed to mitigate/minimize business risk. In my Journal article, I explained the process of how this works.

Once the controls are identified, it is time to create projects and implement them. This might not be a big issue when dealing with a mature company that already has many of controls in place and only needs a few additions. However; this could be challenging when the number of projects and controls increase. Read More >>

Indicates Online-Exclusive Content



What's New for Nonmembers

IS Audit Basics Articles

Innovation in the IT Audit Process

Backup and Recovery

Auditing Mobile Devices

Doing More With Less

Audit Programs

The Soft Skills Challenge, Part 7


Full Journal Issues

Volume 2, 2017 The Evolution of Audit

Volume 1, 2017 Cognitive Technology

Volume 6, 2016 Governance, Risk and Compliance

Volume 5, 2016 Cybersecurity

Volume 4, 2016 Mobile Apps

Volume 3, 2016 Data Privacy

Sponsored Feature Articles

Centralized, Model-Driven Visibility Key to IT-OT Security Management

The AICPA’s New Cybersecurity Attestation Reporting Framework Will Benefit a Variety of Key Stakeholders

Indicators of Exposure and Attack Surface Visualization