Unlocking Strategic Value from a Bug Bounty Program
Are you curious about how to maximize the strategic value and impact of your bug bounty program?...
27:14
Unlocking Strategic Value from a Bug Bounty Program
Are you curious about how to maximize the strategic value and impact of your bug bounty program?...
27:14
The Cyber Standard Podcast - Episode 1
Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!” Join host Ameet...
41:39
Measuring Security Risk Against Dynamic Threats
Getting dressed is a routine example of everyday life packed with choices. Should I wear pants or...
28:34
Reflecting on 25 Years of Information Security Matters
ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security...
13:54
A View into CTEM Exposure Management: Reducing your Attack Surface 3x
Organizations can no longer rely on legacy vulnerability management solutions to protect against...
43:00
Improving Security while Enabling Market Access with CCF
Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain...
21:44
Leveraging Agile Concepts for Neurodiverse Auditors
In this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts can mitigate common...
28:43
Minimizing Risk and Audit Requests
With the increasing demand for audits and risk assessments, artifact requests will not be going...
21:16
Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management
Effective IT issue management is crucial for organizations to mitigate financial loss,...
28:40
Improving Security while Enabling Market Access with CCF
Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain...
22:22
Scaling Your Threat Modeling Program
Understanding product security risk starts before a single code line is written. Teams can...
18:45
Secure your Supply Chain with an Effective Vendor Security Program
Security risks introduced by vendors have become a top-of-mind concern for executives today,...
15:43
Cultivating Inspired Leaders with Kristi Hedges
If we want people to bring their most creative, innovative selves to work, we need to cultivate a...
21:11
Exploring the Benefits of Neurodiversity within Cybersecurity
Neurodiversity within cybersecurity offers many benefits but requires organizations and hiring...
33:58
Internal Audits That Create Stakeholder Value Adopting an Agile Mindset
Agile Scrum is a lightweight framework that promises to significantly improve internal audits by...
22:09
Strategies for Avoiding Burnout
Chronic workplace stress can lead to burnout, which poses a significant risk to the mental health...
26:39
The Danger of Distraction in Augmented Reality
While users of technology are becoming more educated in how to avoid cyberattacks such as...
21:35
Managing Human Risk Requires More Than Just Awareness Training
A comprehensive information security awareness program must be in place to ensure that employees...
21:22
Preparing for Interruptions, Disruptions and Emergence Events
This podcast speaks about how an Information Systems (IS) Auditor can prepare for the...
36:00
IS Audit in Practice: Data Integrity On Demand
On this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter discuss the...
41:21