Top IT Security Bloggers

Isaca
  • Saluting the Spirit of Volunteerism That Made CommunITy Day a Success

    Isaca
    On ISACA’s first CommunITy Day on 5 October, 2019 – a day in which our global professional community came together over one day to volunteer in their local communities – the passion, creativity and industriousness of ISACA’s professional community was on full display.It started with a simple idea: the suggestion of a day of giving across the globe in which ISACA’s rich legacy of volunteerism can help every local community. Be careful what you ask for. All around the globe, ISACA members, sta...
  • A Seat at the Table: Internal Auditors as Operational Partners and Organizational Strategists

    Isaca
    IT auditors new to the profession may hear references to a time when the internal audit function was viewed as the “police.” Years ago, it was not uncommon for organizations to perceive internal audit’s responsibilities of assessment and evaluation as being similar to that of a policing function. Operational errors or deficiencies identified and reported were analogous to crimes in the world of law enforcement. To be fair, there were some personality types within the internal audit profession...
  • ISACA’s SheLeadsTech™ Second Day of Advocacy in DC: Paving Pathways for More Women and Girls in Tech

    Isaca
    More than 60 women and men gathered on Capitol Hill in Washington, DC, on 7 October for the SheLeadsTech program’s second annual Day of Advocacy. Featuring presentations on issues facing the tech workforce and women in the field, plus congressional visits, the Day of Advocacy allowed SheLeadsTech professionals to connect their own experiences with policy and expand their networks. ISACA also launched its “Tech Workforce 2020: The Age and Gender Perception Gap” study at the event.The mission o...
  • Big Data Analytics Powering Progress in Animal Agriculture

    Isaca
    There has been significant progress in technologies that can be utilized in the livestock industry. These technologies will help farmers, breeders associations and other industry stakeholders in continuously monitoring and collecting animal-level and farm-level data using less labor-intensive approaches. Specifically, we are seeing the use of fully automated data recording based on digital images, sounds, sensors, unmanned systems and real-time uninterrupted computer vision. These technologie...
  • Regulatory Landscape Provides Added Incentive for Enterprises to Explore Blockchain

    Isaca
    The increasing emphasis on data privacy gained widespread attention last year with the enforcement deadline of the General Data Protection Regulation (GDPR). Regardless of your perspective on GDPR and its impact on enterprises, the need for organizations to provide more robust solutions to protecting customers’ data is only going to escalate as data sources continue to proliferate and the regulatory environment continues to evolve. While many organizations remain in the early stages of determi...
  • Tips for the Novice IT Auditor

    Isaca
    Norman Ralph Augustine once said, “Two-thirds of the Earth’s surface is covered with water. The other third is covered with auditors from headquarters.” This highlights the rise of the auditing profession and the importance that more and more companies are placing on internal and external audits due to increasing regulatory requirements. This reliance, coupled with the ever increasing dependency on technology, requires a special skill set: the IT auditor. If you have just started down this car...
  • How the CISM and CISSP Certifications Can Complement One Another

    Isaca
    In 2003, I had just completed my MSc in Information Security. I was excited about my future career prospects as I believed I had obtained at least the minimum level of knowledge needed to enter the information security field.I soon realized how wrong I was. As I embarked on my job search, I was frequently asked about the certifications I had. I had none. With the market becoming more and more competitive, it soon became apparent that to even be considered for a security role, I would need to...
  • Are We Asking the Right Questions When It Comes to the InfoSec Skills Shortage?

    Isaca
    Chatting with a colleague recently about local economic issues, she made a remark which I found profoundly interesting at the time. She said that the reason why economic policies are sometimes ineffective is because policymakers are failing to identify their root causes. “We cannot get the right answers if we are not asking the right questions,” she summarized.I recalled that remark as I reflected on the widely reported shortage across multiple industries of people with the needed informatio...
  • How 20 Minutes Can Lead to a More Inclusive Tech Workforce

    Isaca
    If perceptions were always reality, why would a company that has hired professionals after conducting reasonable background checks be wary of internally orchestrated fraud and other white-collar crime? Why would an IT auditor obsess about the consistent integrity of systems and compliance? Many in the audit industry would argue that regular audits will provide objective insights, uncover problems, ensure efficiency, assess risk of material misstatement, assess controls, promote accountability...
  • Who Should the CISO Report To? It Depends

    Isaca
    The information security challenges faced by enterprises are dependent on the unique characteristics of the business. This means there is no one “right” answer for where the CISO sits on the org chart. The strategic goals, risk management strategy, and maturity of your organization are all key factors in determining the most effective reporting structure. So, without a defined best practice, how do you evaluate who your CISO reports to?Know where you’re starting: Understanding your organizati...