Return to Home PageISACA Logo at top of page
  • Credentialing
  • Membership
  • Enterprise
  • PARTNERSHIPS
  • Training & Events
  • Resources
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
    Total
    View Cart Checkout

    No items have been added to your cart yet

    Browse Search
  • Cart (0)
  • Sign In
  • MEMBERSHIP
  • CERTIFICATIONS
  • CERTIFICATES
  • CPE CERTIFICATES
  • Engage
  • LEARNING ACCESS
  • RESOURCES
  • ORDER HISTORY
  • Redeemable Products
  • Sign Out
  • Sign In
  • Create an Account
  • CERTIFICATIONS
    • CISA—Certified Information Systems Auditor
    • CISM—Certified Information Security Manager
    • CRISC—Certified in Risk and Information Systems Control
    • CDPSE—Certified Data Privacy Solutions Engineer
    • CCOA—Certified Cybersecurity Operations Analyst
    • AAIA—Advanced in AI Audit
    • AAISM—Advanced in AI Security Management
    • CGEIT—Certified in the Governance of Enterprise IT
    • CET—Certified in Emerging Technology Certification
    • ITCA—Information Technology Certified Associate
    • CSX-P—CSX Cybersecurity Practitioner Certification
  • CERTIFICATES
    • CCAK—Certificate in Cloud Auditing Knowledge
    • COBIT
      • COBIT 2019 Foundation
      • COBIT 2019 Design & Implementation
      • Implementing the NIST Cybersecurity Framework using COBIT 2019
      • COBIT 5 Certificates
    • Cybersecurity Audit
    • Cybersecurity Fundamentals
    • Digital Trust Ecosystem Framework Foundation Certificate
    • Emerging Technology
      • AI Fundamentals
      • Blockchain Fundamentals
      • Cloud Fundamentals
      • IoT Fundamentals
    • Information Technology
      • Computing Fundamentals
      • Data Science Fundamentals
      • Networks and Infrastructure Fundamentals
      • Software Development Fundamentals
    • IT Audit Fundamentals
    • IT Risk Fundamentals
  • WHICH CERTIFICATION IS RIGHT FOR YOU?
  • VERIFY A CERTIFICATION
  • DIGITAL BADGES
  • RENEW OR MAINTAIN A CERTIFICATION
  • Career Journey
  • Which Exam Prep is Right for You?
  • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
  • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
  • BECOME A MEMBER
    • Browse Chapters
    • Find Your Membership Type
    • Member Benefits
  • ENGAGE ONLINE COMMUNITY
  • GET INVOLVED
    • Advocacy
    • Author an Article
    • Chapter Events Calendar
    • ISACA Awards
    • SheLeadsTech
    • Speak at Conferences
    • Volunteer
  • MAXIMIZE YOUR MEMBERSHIP
    • Career Center
    • Discounts & Savings
    • Free CPE
    • Free Resource Previews
    • Member-Exclusive Leadership Series
    • Mentorship
  • Personalize Your Experience
  • UPDATE YOUR PROFILE
  • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
    • CMMI Performance Solutions
    • CMMI Cybermaturity Platform
    • Voluntary Improvement Program
  • TEAM TRAINING
    • Skills & Credentials
    • CMMI Training
  • CMMI APPRAISALS (PARS)
  • ENTERPRISE SUPPORT
  • CONTACT US
  • Empower Your Team to Power Business Growth
  • CUSTOMIZE YOUR IT TEAM TRAINING
  • BECOME A TRAINING PARTNER
  • BECOME A CMMI PARTNER
  • BECOME AN ACADEMIC OR WORKFORCE PARTNER
  • Sponsorship
    • Become a Sponsor
    • Global Sponsors
  • FIND A TRAINING PARTNER
    • Certification Training Partners
      • Certification Training Partners
      • Americas
      • Asia and Oceania
      • China
      • EMEA
    • COBIT Training Partners
    • Academic & Workforce Partners
    • CMMI Performance Improvement Partners
  • Over 100,000 People Were Trained by ISACA in 2022
  • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • CONFERENCES
    • GRC Conference
    • ISACA Europe Conference
    • ISACA North America Conference
    • ISACA Virtual Conference
    • Student Summit
    • Call for Speakers
  • CHAPTER EVENTS
  • Training Week
  • Virtual Workshops
  • TRAINING BY TYPE
    • Online Review Courses
    • Session Recordings
    • Webinars
    • Virtual Summits
  • GROUP/ENTERPRISE TRAINING
  • TRAINING FROM AN ACCREDITED PARTNER
  • TRAINING BY TOPIC
    • All Training Topics
    • Artificial Intelligence
    • Cybersecurity
    • IT Audit
    • Certification Exam Preparation
    • COBIT
  • On-Demand CPE Training
  • September Featured Training:
  • 15% OFF THE CCOA ONLINE COURSE
  • DIGITAL TRUST
  • ISACA JOURNAL
  • INSIGHTS & EXPERTISE
  • NEWS & TRENDS
  • ENGAGE ONLINE COMMUNITIES
  • COBIT
  • RESOURCES BY TOPIC
    • Artificial Intelligence
    • Cybersecurity
    • Emerging Technology
    • Governance
    • IT Audit
    • IT Risk
    • Privacy
  • FRAMEWORKS, STANDARDS AND MODELS
  • ISACA NOW BLOG
  • ISACA VIDEOS
  • ISACA PODCAST
  • GLOSSARY
  • Announcing ISACA’s Digital Trust Ecosystem Framework and Portfolio
  • Advance Digital Trust
  • Credentialing
    • CREDENTIALING
    • CERTIFICATES
      • CERTIFICATES
      • CCAK—Certificate in Cloud Auditing Knowledge
      • COBIT
        • COBIT 2019 Foundation
        • COBIT 2019 Design & Implementation
        • Implementing the NIST Cybersecurity Framework using COBIT 2019
        • COBIT 5 Certificates
      • Cybersecurity Audit
      • Cybersecurity Fundamentals
      • Digital Trust Ecosystem Framework Foundation Certificate
      • Emerging Technology
        • AI Fundamentals
        • Blockchain Fundamentals
        • Cloud Fundamentals
        • IoT Fundamentals
      • Information Technology
        • Computing Fundamentals
        • Data Science Fundamentals
        • Networks and Infrastructure Fundamentals
        • Software Development Fundamentals
      • IT Audit Fundamentals
      • IT Risk Fundamentals
    • WHICH CERTIFICATION IS RIGHT FOR YOU?
    • VERIFY A CERTIFICATION
    • CERTIFICATIONS
      • CERTIFICATIONS
      • CISA—Certified Information Systems Auditor
      • CISM—Certified Information Security Manager
      • CRISC—Certified in Risk and Information Systems Control
      • CDPSE—Certified Data Privacy Solutions Engineer
      • CCOA—Certified Cybersecurity Operations Analyst
      • AAIA—Advanced in AI Audit
      • AAISM—Advanced in AI Security Management
      • CGEIT—Certified in the Governance of Enterprise IT
      • CET—Certified in Emerging Technology Certification
      • ITCA—Information Technology Certified Associate
      • CSX-P—CSX Cybersecurity Practitioner Certification
    • DIGITAL BADGES
    • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
    • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
    • RENEW OR MAINTAIN A CERTIFICATION
    • Career Journey
  • Membership
    • MEMBERSHIP
    • BECOME A MEMBER
      • BECOME A MEMBER
      • Browse Chapters
      • Find Your Membership Type
      • Member Benefits
    • ENGAGE ONLINE COMMUNITY
    • MAXIMIZE YOUR MEMBERSHIP
      • MAXIMIZE YOUR MEMBERSHIP
      • Career Center
      • Discounts & Savings
      • Free CPE
      • Free Resource Previews
      • Member-Exclusive Leadership Series
      • Mentorship
    • UPDATE YOUR PROFILE
    • GET INVOLVED
      • GET INVOLVED
      • Advocacy
      • Author an Article
      • Chapter Events Calendar
      • ISACA Awards
      • SheLeadsTech
      • Speak at Conferences
      • Volunteer
  • Enterprise
    • ENTERPRISE
    • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI Performance Solutions
      • CMMI Cybermaturity Platform
      • Voluntary Improvement Program
    • CUSTOMIZE YOUR IT TEAM TRAINING
    • TEAM TRAINING
      • ENTERPRISE TRAINING AND CREDENTIALS
      • Skills & Credentials
      • CMMI Training
    • CMMI APPRAISALS (PARS)
    • ENTERPRISE SUPPORT
    • CONTACT US
  • PARTNERSHIPS
    • PARTNERSHIPS
    • BECOME A TRAINING PARTNER
    • BECOME A CMMI PARTNER
    • BECOME AN ACADEMIC OR WORKFORCE PARTNER
    • Sponsorship
      • Become a Sponsor
      • Global Sponsors
    • FIND A TRAINING PARTNER
      • FIND A TRAINING PARTNER
      • Certification Training Partners
        • Certification Training Partners
        • Americas
        • Asia and Oceania
        • China
        • EMEA
      • COBIT Training Partners
      • Academic & Workforce Partners
      • CMMI Performance Improvement Partners
    • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • Training & Events
    • TRAINING AND EVENTS
    • CONFERENCES
      • CONFERENCES
      • GRC Conference
      • ISACA Europe Conference
      • ISACA North America Conference
      • ISACA Virtual Conference
      • Student Summit
      • Call for Speakers
    • CHAPTER EVENTS
    • Training Week
    • Virtual Workshops
    • TRAINING BY TYPE
      • TRAINING BY TYPE
      • Online Review Courses
      • Session Recordings
      • Webinars
      • Virtual Summits
    • GROUP/ENTERPRISE TRAINING
    • TRAINING FROM AN ACCREDITED PARTNER
    • TRAINING BY TOPIC
      • Find Training by Topic
      • All Training Topics
      • Artificial Intelligence
      • Cybersecurity
      • IT Audit
      • Certification Exam Preparation
      • COBIT
    • On-Demand CPE Training
    • 15% OFF THE CCOA ONLINE COURSE
  • Resources
    • RESOURCES
    • DIGITAL TRUST
    • ISACA JOURNAL
    • INSIGHTS & EXPERTISE
    • NEWS & TRENDS
    • ENGAGE ONLINE COMMUNITIES
    • COBIT
    • RESOURCES BY TOPIC
      • Artificial Intelligence
      • Cybersecurity
      • Emerging Technology
      • Governance
      • IT Audit
      • IT Risk
      • Privacy
    • FRAMEWORKS, STANDARDS AND MODELS
    • ISACA NOW BLOG
    • ISACA VIDEOS
    • ISACA PODCAST
    • GLOSSARY
    • Advance Digital Trust
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
  • Cart
Sign In
Home / Resources / White Papers / Continuous Assurance Using Data Threat Modeling
Continuous Assurance Using Data Threat Modeling
Whitepaper

Continuous Assurance Using Data Threat Modeling

Adopt an Attacker’s-Eye View To Monitor Data and Establish Controls

Business professionals and IT practitioners agree that data are a valuable commodity for enterprises in many ways. The notion of using data to help monitor and manage risk tolerances in audit and assurance activities is often overlooked. Data should be considered and analyzed as the enterprise selects, plans and deploys controls, and should also be part of enterprise evaluation of the performance of those controls.

New threats to data may occur suddenly or over time, so a formal mechanism should be established to account for data threats in a structured, systematic way. Our FREE white paper, Continuous Assurance Using Data Threat Modeling, produced with SecurityScorecard offers a path forward: Adopt an attacker’s-eye view of your data by employing the common security practice of threat modeling and applying those tactics to data.

By looking at data this way and following this formalized methodology, enterprises can establish a model and baseline for monitoring data risk over time and maintaining risk within acceptable parameters. Keep your controls environment up-to-date and protect the data and other valuable enterprise assets needed for competitive advantage. Download your FREE white paper today!

Download
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • Contact Us
  • Terms
  • Privacy
  • Cookie Notice
  • Cookie Settings
  • Fraud Reporting
  • Bug Reporting

1700 E. Golf Road, Suite 400, Schaumburg, Illinois 60173, USA  |  +1-847-660-5505  |  ©2025 ISACA. All rights reserved.