News

The convergence of information technology (IT) and operational technology (OT) is rapidly changing the industrial landscape ...
Two of the most significant challenges in remote auditing are enabling key relationships and accessing information. But ...
Can organizations balance harnessing the value of data with protecting consumer privacy? What is the balance between the ...
What happens if weaknesses in an organization's monitoring and detection capabilities cloud visibility so severely that it has no idea how much risk it is truly absorbing?
The evolution of technology has transformed human–machine relationships, resulting in an unprecedented computing environment ...
Nearly three out of four European IT and cybersecurity professionals say staff are already using generative AI at work – up ten points in a year – but just under a third of organisations have put ...
Urgent training needs Top AI risks Workforce readiness Year-over-year trends ...
Spotlighting the Member-Exclusive Speaker Series ISACA is proud to offer member-exclusive access to series of leadership skill building webinars in the Member-Exclusive Speaker Series. Led by industry ...
Cyber Risk and Communicating to a Board of Directors Part I--Digital transformation has heightened due to the pandemic. We went from, “we can’t work from home” to “we can only work from home moving ...
ISACA Digital Videos Experience ISACA through our lens. Explore our educational content, ISACA news and events, in-depth interviews with experts in cybersecurity, IT audit, governance and so much more ...
CMMI Tech Talk: Risk and Opportunity Management (RSK) Practice Area Overview Review of the Risk and Opportunity Management (RSK) Practice Area. We will discuss the intent of this Practice Area and ...
Mark Thomas, founder of Escoute Consulting, provides his perspectives on the benefits and positive outcomes of ISACA Team Training for students, teams, and team leaders, why it is worth the investment ...