When you want guidance, insight, tools and more, you’ll find them in the resources ISACA puts at your disposal.
Use our Resource Center interactive search tool to find the wisdom, tools and training you seek in seconds.
ISACA resources are compiled, written, reviewed and developed from the real-world experiences of experts in the field.
Explore the globally recognized framework for the governance of enterprise IT.
Insights and Expertise
Gain insights and grow your know-how with expert-developed white papers, discussions, programs and tools.
Frameworks, Standards and Models
Use the right frameworks to add value to your role and enterprise.
Read through peer-reviewed, in-depth articles on pressing industry topics.
News & Trends
Blogs, Podcast and Newsletters. Explore the latest on industry standards, best practices and emerging trends.
Attaining Digital Transformation Readiness
It does not matter whether it is Industry 4.0, a digital twin, the Internet of Machines, distributed system optimization in edge computing or just plain process digitization, digital transformation initiatives are about positively...Author: Guy Pearce
Complacency Presents a Glaring Career Risk
Alison Levine, First American Women's Everest Expedition Team Captain and a New York Times bestselling author of “On the Edge,” will be the opening keynote speaker at ISACA’s 2020 North America CACS conference16 January 2020
Harnessing the Power of Emerging Technology
Emerging technologies such as quantum computing, artificial intelligence (AI) and augmented reality (AR) have tremendous potential and pose significant risk
Using Red Teaming to Improve Your Security
Red team exercises can help enterprises find and address their weaknesses. Unfortunately, the cybersecurity skills gap extends to red teams and blue teams. In this podcast, Frank Downs and Dustin Brewer discuss why red teaming, in conjunction with blue teaming, is a valuable tool for cybersecurity, and they also discuss some of the causes of and solutions to the skills gap.18 December 2019
The Intelligent Audit
Artificial intelligence (AI) is a key contributor to recent technological innovations, including autopiloted cars.
Bridging the Digital Risk Gap
Information Security and Risk Management: Working TogetherAs the pace of change in enterprise technology increases, so do the risks. This situation requires increasing collaboration between risk management and information technology professionals to ensure the value of technological investments is maximized. Unfortunately, that is not always the case.
Implementing the NIST Cybersecurity Framework Using COBIT 2019
Many enterprises lack an approach to integrate cybersecurity standards and enterprise governance of Information & Technology (EGIT). This lack of approach leaves them unable to establish systematic—yet flexible and achievable—governance and management objectives, processes, and capability levels to make measured improvements toward cybersecurity goals. Related Item: NIST Cybersecurity Framework V1.1/COBIT 2019 Mapping
Amazon Web Services (AWS) Audit Program
The primary purpose of the Amazon Web Services (AWS) Audit Program is to provide a means for organizations to evaluate their deployments of AWS. This assessment facilitates assurance that the configuration and maintenance of AWS services support business objectives. Accordingly, the audit program gives consideration to the intended use of AWS services and interrelationships of AWS services.
FREE to ISACA Members
Not a Member? Join Now