Top IT Security Bloggers

Isaca
  • Connecting Business and IT Goals Through COBIT 5

    Isaca
    Business leaders must take accountability for governing and managing IT-related assets within their units and functions just as they would other assets, such as those involving physical plant or human resources.This is critical as achieving enterprise goals becomes increasingly interconnected with successfully managing and governing its technology. COBIT 5 provides the framework needed to connect business goals with IT goals while utilizing non-technical, business language, as explored in a r...
  • Three Questions with Daymond John

    Isaca
    Editor’s note: Daymond John, the FUBU clothing founder, Shark Tank reality TV judge and a self-made multimillionaire, will deliver the closing keynote address at ISACA’s North America CACS 2017 conference, which will take place 1-3 May in Las Vegas, Nevada, USA. John visited with ISACA Now about what innovation means to him, his approach to taking business risks and the Shark Tank experience. The following is an edited transcript:ISACA Now: The word ‘innovative’ is thrown around a lot. What d...
  • Security and Compliance - A Relentless Battle

    Isaca
    The overall objective for security controls is to support the organization’s services and infrastructure by identifying risks, improving the security level, and enabling rapid detection and response to security attacks.It is also true that, in practice, no organization can place all the security controls against every cyberattack by itself. Consequently, it is now a growing practice that many organizations leverage a hybrid model for their security controls. For example, organizations put in...
  • Demand for CISA Continues to Grow

    Isaca
    Many of us ask ourselves: “How can I differentiate myself from others in the workplace? I have plenty of drive and ambition to improve my professional skills – what can I do to demonstrate this to employers?”Increasingly, for many, the answer is professional certifications. The Certified Public Accountant (CPA) exam and associated credential were created in 1917. Since then, mostly within the past several decades, professional certifications have flourished. One can earn certifications in jus...
  • 6 Ways Artificial Intelligence Will Revamp Your Business

    Isaca
    Artificial intelligence this, artificial intelligence that … everyone wants to talk about how AI technology is changing various aspects of society. And while it’s true that AI will have an impact on just about everything we see and do in the next decade, it’s likely that no single aspect of society will be more transformed than business.Over the past couple of years, I’ve noticed just how much AI has influenced strategic business decisions and actions in my industry. I want to be careful not...
  • Faces of ISACA: Babiak Motivated to Help Women Take Final Career Steps

    Isaca
    Jan Babiak draws upon her decades of high-level career experience to work toward expanded opportunities for women working in technology – all the way to the top.Babiak, a longtime ISACA member and board member with Walgreens Boots Alliance., Inc., Bank of Montreal and GHD Group, has made advocating for women advancing to upper management one of her core priorities. She is involved in the International Women’s Forum and Women Corporate Directors, among other organizations, in her efforts to co...
  • Addressing Technology Gender Gap is All of Our Responsibility

    Isaca
    I recently met a young woman in Ireland who was working toward a technology-oriented degree, and she recalled being among three women in her course at the beginning of the semester. By the end of the semester, she was the last woman standing.My new acquaintance suspected that her female classmates wavered on continuing their course of study because their classes were so male-dominated. And who can blame them? While some women are more comfortable than others being vastly outnumbered, the shor...
  • Incident Response – Being Prepared for the Worst-Case Scenario

    Isaca
    It is no secret that in today’s world, information is more at risk than ever before. Unfortunately, we now must deal with the realization that it’s not if an attempted breach will occur on your network, but rather when. Despite an organization’s best efforts to secure networks and information, human error and system vulnerabilities will continue to exist. Considering that reality, organizations must be sure to prepare an actionable plan for when the worst-case scenarios play themselves out.In...
  • Leveraging UAS Technology: Time is of the Essence

    Isaca
    Unmanned aerial system (UAS) technology has the potential to revolutionize a broad cross-section of industries, ranging from media and telecommunications to agriculture and construction. In the future, a forward-leaning regulatory framework will allow businesses of all sizes to leverage this technology to maximize revenue, create efficiencies, and expand the scope of goods and services available to consumers, not to mention deliver hundreds of billions of dollars to the economy. The Small UAV...
  • IT Risk: Making Better Connections Between Smoke and Fire

    Isaca
    Adults don’t really like new ideas, and while cyber risk may have been born around the time of the first mainframes, it can still feel new today. CEB reported last month that 66 percent of business leaders don’t understand the cyber security information that goes to the board. This isn’t a failure of business leaders but of the messages they’re receiving.While children consume and learn voraciously, adults struggle with finding context, skepticism, and social conditioning. Overcoming these co...