Ahorra 5 meses con 1 año de Premium al 35% dto ¡Lo quiero!
ISACA Podcast

podcast

Suscribirse

ISACA Podcast

Por ISACA Podcast
En ISACA Podcast

Unlocking Strategic Value from a Bug Bounty Program

Are you curious about how to maximize the strategic value and impact of your bug bounty program?...

Añadir a ... 

The Cyber Standard Podcast - Episode 1

Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!” Join host Ameet...

Añadir a ... 

Measuring Security Risk Against Dynamic Threats

Getting dressed is a routine example of everyday life packed with choices. Should I wear pants or...

Añadir a ... 

Reflecting on 25 Years of Information Security Matters

ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security...

Añadir a ... 

A View into CTEM Exposure Management: Reducing your Attack Surface 3x

Organizations can no longer rely on legacy vulnerability management solutions to protect against...

Añadir a ... 

Improving Security while Enabling Market Access with CCF

Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain...

Añadir a ... 

Leveraging Agile Concepts for Neurodiverse Auditors

In this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts can mitigate common...

Añadir a ... 

Minimizing Risk and Audit Requests

With the increasing demand for audits and risk assessments, artifact requests will not be going...

Añadir a ... 

Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management

Effective IT issue management is crucial for organizations to mitigate financial loss,...

Añadir a ... 

Improving Security while Enabling Market Access with CCF

Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain...

Añadir a ... 

Scaling Your Threat Modeling Program

Understanding product security risk starts before a single code line is written. Teams can...

Añadir a ... 

Secure your Supply Chain with an Effective Vendor Security Program

Security risks introduced by vendors have become a top-of-mind concern for executives today,...

Añadir a ... 

Cultivating Inspired Leaders with Kristi Hedges

If we want people to bring their most creative, innovative selves to work, we need to cultivate a...

Añadir a ... 

Exploring the Benefits of Neurodiversity within Cybersecurity

Neurodiversity within cybersecurity offers many benefits but requires organizations and hiring...

Añadir a ... 

Internal Audits That Create Stakeholder Value Adopting an Agile Mindset

Agile Scrum is a lightweight framework that promises to significantly improve internal audits by...

Añadir a ... 

Strategies for Avoiding Burnout

Chronic workplace stress can lead to burnout, which poses a significant risk to the mental health...

Añadir a ... 

The Danger of Distraction in Augmented Reality

While users of technology are becoming more educated in how to avoid cyberattacks such as...

Añadir a ... 

Managing Human Risk Requires More Than Just Awareness Training

A comprehensive information security awareness program must be in place to ensure that employees...

Añadir a ... 

Preparing for Interruptions, Disruptions and Emergence Events

This podcast speaks about how an Information Systems (IS) Auditor can prepare for the...

Añadir a ... 

IS Audit in Practice: Data Integrity On Demand

On this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter discuss the...

Añadir a ...