Look for any podcast host, guest or anyone
Showing episodes and shows of

ISACA Podcast

Shows

ISACA PodcastISACA PodcastSecuring Desktops and Data from Ransomware AttacksRansomware remains one of the most formidable cybersecurity threats facing organizations worldwide. In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection expert Jeremy Moskowitz, who explains how ransomware infiltrates and cripples desktop environments. He explains cybercriminals' tactics to exploit social engineering and system misconfigurations to gain unauthorized access, offering actionable insights on the most effective prevention and mitigation strategies. Additionally, Jeremy delivers practical advice that security teams can use to resist ransomware. He shares tips on safeguarding locally stored data, implementing robust backup solutions, enforcing strict access controls and...2025-05-1539 minISACA PodcastISACA PodcastCybersecurity Predictions for 2025The prevalence of ransomware and the security concerns associated with AI have made the role of cybersecurity professionals vital for enterprise success. The complex security landscape can make cybersecurity jobs stressful, but enterprises can take steps to retain cybersecurity talent and ensure enterprise assets are protected. In this podcast, Justin Rende, founder and CEO at Rhymetec, shares insight on the top concerns for cybersecurity professionals, the most in-demand skills, and the impact of AI on cybersecurity.  2025-01-0726 minISACA PodcastISACA PodcastExamining Authentication in the Deepfake Era with Dr. Chase CunninghamGiven the dynamic nature of cyberthreats and the ever-expanding digital ecosystem, authentication is more critical than ever. In this episode, ISACA director of professional practices and innovation discusses a new content piece titled, "Examining Authentication in the Deepfake Era" with author Dr. Chase Cunningham. Their conversation of the paper explores the evolution, current state, and future trajectory of authentication technologies.  2024-12-1038 minISACA PodcastISACA PodcastSafely and Responsibly Using Emerging Health TechnologyEmerging healthcare technologies have the potential to revolutionize healthcare and accessibility-related concerns, but these advancements are not without risk. To maximize the value and minimize the harms associated with emerging health technologies, it is critical to address ethical, privacy, and societal concerns to ensure that these technologies help rather than hurt humanity.   In this ISACA Podcast, join Safia Kazi and Collin Bedder as they explore the applications and risks associated with emerging healthcare technologies. 2024-12-0525 minISACA Germany Chapter - Innovation & TechTalk PodcastISACA Germany Chapter - Innovation & TechTalk PodcastFolge 13 - ISACA | IIAS Fachtagung am 29. Januar 2024 in Zürich​ISACA Innovation & Tech Talk Podcast Series - Folge 13 - ISACA | IIAS Fachtagung am 29. Januar 2024 in Zürich​ - Sonderfolge in Zusammenarbeit mit dem ISACA Switzerland Chapter zur Vorstellung der ISACA | IIAS Fachtagung am 29. Januar 2024 in Zürich​ - Im Gespräch mit Andrea Tribelhorn, Präsidentin des ISACA Switzerland Chapters und Thomas Streckeisen, Vorstandsmitglied für Konferenzen beim  ISACA Switzerland ChapterMehr Podcasts von ISACA Germany gibt es unter: https://www.isaca.de/podcastsAnregungen, Kritik oder Vorschläge für Themen bitte an: fg-innovation@isaca.de2024-09-2307 minISACA Germany Chapter - Innovation & TechTalk PodcastISACA Germany Chapter - Innovation & TechTalk PodcastFolge 14 - IT-GRC Kongress 3.- 4. Juni 2024 in HamburgISACA Podcast Series - Folge 14 - IT-GRC Kongress 3.- 4. Juni 2024 in Hamburg - Im Gespräch mit Julia HermannMehr Podcasts von ISACA Germany gibt es unter: https://www.isaca.de/podcastsAnregungen, Kritik oder Vorschläge für Themen bitte an: fg-innovation@isaca.de2024-09-2304 minISACA Germany Chapter - Innovation & TechTalk PodcastISACA Germany Chapter - Innovation & TechTalk PodcastFolge 2 - ISACA Zertifikatsseminar: ISP Information Security PractitionerISACA Innovation & Tech Talk Podcast Series - Folge 2 - ISACA Zertifikatsseminar: ISP Information Security Practitioner - Im Gespräch mit Philipp Christopher Rothmann von der Fachgruppe InformationssicherheitMehr Podcasts von ISACA Germany gibt es unter: https://www.isaca.de/podcastsAnregungen, Kritik oder Vorschläge für Themen bitte an: fg-innovation@isaca.de2024-09-2303 minISACA Germany Chapter - Innovation & TechTalk PodcastISACA Germany Chapter - Innovation & TechTalk PodcastFolge 3 - Einblicke in den Vorstand von ISACA DeutschlandISACA Innovation & Tech Talk Podcast Series - Folge 3 - Einblicke in den Vorstand von ISACA Deutschland - Im Gespräch mit Julia Hermann und Matthias KraftMehr Podcasts von ISACA Germany gibt es unter: https://www.isaca.de/podcastsAnregungen, Kritik oder Vorschläge für Themen bitte an: fg-innovation@isaca.de2024-09-2307 minISACA Germany Chapter - Innovation & TechTalk PodcastISACA Germany Chapter - Innovation & TechTalk PodcastFolge 4 - ISACA IT-GRC Kongress 27.- 28. September 2022 in MannheimISACA Innovation & Tech Talk Podcast Series - Folge 4 - Ausblick auf den ISACA IT-GRC Kongress 27.- 28. September 2022 in Mannheim - Im Gespräch mit Matthias Kraft und Ioannis KaramitrosMehr Podcasts von ISACA Germany gibt es unter: https://www.isaca.de/podcastsAnregungen, Kritik oder Vorschläge für Themen bitte an: fg-innovation@isaca.de2024-09-2307 minISACA Germany Chapter - Innovation & TechTalk PodcastISACA Germany Chapter - Innovation & TechTalk PodcastFolge 11 - ISACA IT-GRC Kongress 7.- 8. November 2023 in MünchenISACA Innovation & Tech Talk Podcast Series - Folge 11 - Ausblick auf den ISACA IT-GRC Kongress 7.- 8. November 2023 in München - Im Gespräch mit Angelika Holl und Matthias KraftMehr Podcasts von ISACA Germany gibt es unter: https://www.isaca.de/podcastsAnregungen, Kritik oder Vorschläge für Themen bitte an: fg-innovation@isaca.de2024-09-2305 minISACA PodcastISACA PodcastWhat Enterprises Need to Know About ChatGPT and CybersecurityMany people are pondering whether generative artificial intelligence (AI) tool ChatGPT is a friend or a foe.   In this ISACA podcast episode, Camelot Secure Director of Solutions Engineering Zachary Folks discusses not only his view of how ChatGPT can be considered an evolution of the encyclopedia, but importantly how it is aiding cybersecurity professionals and the overall goal of enterprise security, as well as how cybercriminals who want to exploit it can leverage it as well. He believes the world is entering a time when AI is fighting AI, and security professionals must focus on f...2024-07-2421 minISACA PodcastISACA PodcastThe Cyber Standard Podcast - Episode 4Welcome to Episode 4 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the world of cybersecurity standardization. In this episode, titled "Becoming a License Body," Ameet is joined by esteemed guests Bryan Lillie, Strategic Technical Lead at the UK Cyber Security Council, and Peter Leitch, Co-Founder and Managing Partner at ANSEC. Together, they explore the intricacies of licensed bodies in shaping the cyber profession. Don't miss this insightful conversation! Explore Further: Delve deeper into the subject with additional resources provided in...2024-05-3048 minISACA PodcastISACA PodcastThe Cyber Standard Podcast - Episode 3Welcome to Episode 3 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the essential aspects of applying for and assessing candidates in the cybersecurity field. In this episode, titled "How to Apply," Ameet is joined by distinguished guests Ethan Duffell, representing the UK Cyber Security Council, and Allan Broadman, Director of CyberAdvisor London. Together, they shed light on the launch of specializations and the significance of professional standards in the cybersecurity sector. Don't miss this insightful conversation! Explore Further: Delve deeper...2024-04-2555 minISACA PodcastISACA PodcastEffective Third Party Risk Management in 2024: AI’s Impact and Future TrendsTraditional security questionnaires just aren't cutting it anymore. Tune into this ISACA Podcast episode, Chris McGowan chats with VISO TRUST CEO and Co-founder, Paul Valente as they delve into the evolving landscape of Third-Party Risk Management (TPRM), exposing the limitations of current methods and exploring how emerging AI trends are shaping a more secure future and driving more effective third-party risk management programs. To learn more about VISO Trust please go to https://visotrust.com/ 2024-04-2431 minISACA PodcastISACA PodcastUnlocking Strategic Value from a Bug Bounty ProgramAre you curious about how to maximize the strategic value and impact of your bug bounty program? In this episode, you can learn how Adobe continuously develops and improves its bounty program to engage security researchers and hackers globally and improve its security posture from an adversary perspective. In this ISACA Podcast, Chris McGown, ISACA's Information Security Professional Practices Principal, chats with Alex Stan, Product Security Engineer and member of the Product Security Incident Response Team (PSIRT), discusses the value of bug bounty programs and shares how you can develop a metrics-driven approach to enhance...2024-04-0327 minISACA PodcastISACA PodcastThe Cyber Standard Podcast - Episode 2Welcome to Episode 2 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the intricacies of cybersecurity standardization. In this episode, titled "Audit and Assurance," Ameet is joined by esteemed guests Leanne Sperry, Project Manager for Standards Development at the UK Cyber Security Council, and Mike Hughes, the ISACA Immediate Past President for ISACA Central UK. Together, they explore key challenges, lessons learned, and insights from related workshops in the realm of Audit and Assurance. Don't miss this insightful conversation! Explore Further: ...2024-03-2842 minISACA PodcastISACA PodcastThe Cyber Standard Podcast - Episode 1Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!” Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA Principal, IT Audit Professional Practices, and Annmarie Dann, Director of Professional Standards at the UK Cyber Security Council, in a compelling discussion about the standardization of specialisms in cybersecurity. Explore the Council's and ISACA's visions for the future, the significance of the Audit & Assurance specialism, and the collaborative efforts between the two organizations. Don't miss this insightful conversation that sets the stage for the podcast's journey into the world of cybersecurity standardization. Expl...2024-02-2841 minISACA PodcastISACA PodcastMeasuring Security Risk Against Dynamic ThreatsGetting dressed is a routine example of everyday life packed with choices. Should I wear pants or shorts? Do I need a sweater? Shoes or sandals? While we often make these choices subconsciously, even actions that don’t appear as choices include several microscopic risk-based calculations. These judgments are executed based on some estimate of risk, and as known in the cybersecurity industry, what is believed to be safe today may no longer be safe tomorrow (or possibly even within the hour). Given this unique challenge, how do you establish a process that allows you to identify, an...2024-02-2128 minISACA PodcastISACA PodcastReflecting on 25 Years of Information Security MattersISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security Matters column. Over the last quarter century, technology, security, and the workforce have evolved, while certain challenges remain the same. In this ISACA Podcast episode, Safia Kazi speaks to Steve about how he started writing for the Journal, societal shifts in security perceptions, and how writing skills are invaluable for anyone in the security industry. 2024-02-1413 minISACA PodcastISACA PodcastA View into CTEM Exposure Management: Reducing your Attack Surface 3xOrganizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability management, security around misconfigurations, patching, identity, software, external attack surfaces, and more must be included. In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains that an organization can prevent breaches and ransomware by taking an asset-centric prioritized-security approach that includes all of these security areas. For more ISACA...2024-02-0743 minISACA PodcastISACA PodcastImproving Security while Enabling Market Access with CCFSoftware-as-a-Service (SaaS) providers continue to face increasing customer demand to attain security compliance certifications that demonstrate commitment to security, privacy, confidentiality, and more. Pursuing every national and international certification individually results in a repetitive cycle of ongoing walkthroughs, interviews, testing, and evidence requests (i.e., audits). A central CCF can be considered a one-stop shop response to the complex alphabet soup of compliance standards on the market today. In this ISACA Podcast episode, ISACA's Chris McGowan listens in as Zach Folk, Director of Solutions Engineering explains why having a central CCF can help various product...2024-01-3121 minISACA PodcastISACA PodcastLeveraging Agile Concepts for Neurodiverse AuditorsIn this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts can mitigate common challenges neurodiverse auditors face in the workplace. Neurodivergent auditors can bring a fresh and dynamic energy to projects if given appropriate accommodation. Join us as ISACA's Robin Lyons chats with Program External Audit IT Program Manager Amanda Tucker as they explore small changes that can significantly impact not only neurodiverse individuals on your team but the entire team itself.  2024-01-1728 minISACA PodcastISACA PodcastMinimizing Risk and Audit RequestsWith the increasing demand for audits and risk assessments, artifact requests will not be going away anytime soon. However, the burden these activities bring to the organization can be drastically reduced when audit and risk work together. In this ISACA Podcast episode, Paul Phillips, Director of Event Content Development at ISACA, hosts Staff Governance, Risk, and Compliance Analyst Benjamin Bartz. Ben takes a deeper dive and elaborates on some of the must-haves for this partnership to live to its full potential. 2024-01-0321 minISACA PodcastISACA PodcastIssue Management Confidential: Tools and Best Practices for Improving IT Issue ManagementEffective IT issue management is crucial for organizations to mitigate financial loss, reputational damage, and operational disruptions. Issue management tools streamline the process by tracking and resolving issues, while risk rating helps prioritize responses based on their impact and likelihood. In this ISACA Podcast episode, ISACA's GRC Professional Practices Principal, Lisa Cook chats with IT Risk Manager, Eric Peck about why acknowledging and addressing high-risk issues with a structured approach empowers organizations to protect themselves and ensure compliance in today's complex regulatory landscape. 2023-12-2728 minISACA PodcastISACA PodcastImproving Security while Enabling Market Access with CCFSoftware-as-a-Service (SaaS) providers continue to face increasing customer demand to attain security compliance certifications that demonstrate commitment to security, privacy, confidentiality, and more. Pursuing every national and international certification individually results in a repetitive cycle of ongoing walkthroughs, interviews, testing, and evidence requests (i.e., audits). A central CCF can be considered a one-stop shop response to the complex alphabet soup of compliance standards on the market today. In this ISACA Podcast episode, ISACA's Lisa Cook listens in as James Huang, Global Cloud Compliance Senior Manager, explains why having a central CCF can help various...2023-12-1322 minISACA PodcastISACA PodcastScaling Your Threat Modeling ProgramUnderstanding product security risk starts before a single code line is written. Teams can discover threats to the architecture of a system early in the development life cycle with Threat Modeling. While it’s not a new concept, how do we transform traditional ways of Threat Modeling to meet the complexities of modern software development at scale? In this ISACA Podcast episode, Chris McGowan chats with Lauren Strope, Manager of Application Security at Adobe. Lauren offers her expertise on strategies for scaling your program and provides unique perspectives on the future of Threat Modeling. Learn mo...2023-11-1518 minISACA PodcastISACA PodcastSecure your Supply Chain with an Effective Vendor Security ProgramSecurity risks introduced by vendors have become a top-of-mind concern for executives today, driven by recent supply chain incidents that have exposed organizations to operational and reputational risks. A robust vendor security program is now a must, as it helps ensure compliance and proactively identifies and mitigates these risks throughout the vendor lifecycle. However, many vendor security teams today face an ever-growing backlog of security reviews, creating increased urgency and pressure for teams to maintain quality assessments. These reviews are often perceived as time-consuming in the procurement process, calling for a balance between meeting business demands and...2023-10-0515 minISACA PodcastISACA PodcastCultivating Inspired Leaders with Kristi HedgesIf we want people to bring their most creative, innovative selves to work, we need to cultivate a culture where inspiration is given, encouraged, and fostered.   In this ISACA Podcast, Kristi Hedges, executive coach, and leadership development consultant, speaker, and author, gives a sneak peek of her upcoming member-exclusive 'Cultivating Inspired Leaders, a CPE-eligible event. At the event, Kristi Hedges will provide a roadmap for building an inspired mindset for leaders, teams, and individuals.   Register for this ISACA event at https://www.isaca.org/membership/member-exclusive-speaker-series 2023-10-0321 minISACA PodcastISACA PodcastExploring the Benefits of Neurodiversity within CybersecurityNeurodiversity within cybersecurity offers many benefits but requires organizations and hiring managers to re-evaluate hiring practices and job descriptions typically structured for neurotypical applicants. Join ISACA's Director of Professional Practices and Innovation as he hosts a conversation with a company helping to remove barriers and maximize the value neurodiverse talent brings to cybersecurity.   For more ISACA Podcast, go to https://www.isaca.org/resources/news-and-trends/isaca-podcast-library  2023-09-2733 minISACA PodcastISACA PodcastInternal Audits That Create Stakeholder Value Adopting an Agile MindsetAgile Scrum is a lightweight framework that promises to significantly improve internal audits by creating a mindset that generates stakeholder value through adaptive solutions for complex auditing problems. This mindset is needed as organizations face unprecedented changes and pressures in today's business landscape. Internal audits must keep leaders informed and aware of potential risks. Such a mindset addresses some of the often-experienced auditing challenges such as a lack of senior management support, insufficient audit preparation time, difficult auditees and lack of time needed to write audit results. Featuring special guest Thomas Bell and hosted by...2023-08-1622 minISACA PodcastISACA PodcastStrategies for Avoiding BurnoutChronic workplace stress can lead to burnout, which poses a significant risk to the mental health of busy professionals, such as auditors. But how can these professionals protect themselves from burnout? And how can their employers help them do so? If you are interested in learning the answers to these questions, then watch as ISACA’s Robin Lyons and Dr. Elena Klevsky, Assistant Professor of Accounting at the University of Tampa, discuss strategies for avoiding burnout. Inspired by the Sustainable Model of Human Energy proposed by Ryan Quinn, Gretchen Spreitzer and Chak Fu Lam, these strategies focus on...2023-08-0926 minISACA PodcastISACA PodcastThe Danger of Distraction in Augmented RealityWhile users of technology are becoming more educated in how to avoid cyberattacks such as phishing, a distracted user might be more prone to missing signs of social engineering. This project explored whether users immersed in augmented reality applications were more inclined to fall for an on-screen text message that prompted familiarity (such as a friend calling in) or urgency (such as a warning to update software or be subject to an automatic device re-boot within a certain timeframe). Featuring special guest Sarah Katz and hosted by ISACA's Collin Beder. 2023-08-0221 minISACA PodcastISACA PodcastManaging Human Risk Requires More Than Just Awareness TrainingA comprehensive information security awareness program must be in place to ensure that employees are aware of and educated about the threats they may encounter at the workplace. The workforce needs to be prepared to know how to respond to these threats. It all starts with a risk assessment to identity the most critical of risks that need to be mitigated through preparedness. Making security a part of the organization’s culture reduces these risks to an acceptable level. Featuring special guest Chris Madeksho and hosted by ISACA's Lisa Cook. 2023-07-2621 minISACA PodcastISACA PodcastPreparing for Interruptions, Disruptions and Emergence EventsThis podcast speaks about how an Information Systems (IS) Auditor can prepare for the Interruptions, Disruptions and the Emergence events that happen to the business and to technology. Describing the features of Interruptions, Disruptions and Emergence events and distinguishing the differences between them, special guest Anantha Sayana outlines how the IS Auditor can prepare, react, and contribute to all the three. Hosted by ISACA's Hollee Mangrum-Willis. 2023-07-1936 minISACA PodcastISACA PodcastIS Audit in Practice: Data Integrity On DemandOn this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter discuss the disparities between American communities and access to electronic health records. From there, they examine how key data insights from the ISACA community can help us all be healthier. 2023-07-1141 minISACA PodcastISACA PodcastISACA Live | Digital Trust Priorities for Privacy and Emerging TechISACA Digital Trust Advisory Council Members Anne Toth and Michelle Finneran Dennedy will discuss privacy concerns and priorities around emerging tech and the most critical considerations for ensuring strong digital trust. Hosted by ISACA's Safia Kazi.  2023-06-2828 minISACA PodcastISACA PodcastProcesses of Engagement with Scott GouldScott Gould is the author of 'The Shape of Engagement: The Simple Process Behind how Engagement Works.' In this podcast, Scott gives a sneak peak at his upcoming member-exclusive, CPE-eligible event. Scott will discuss the essential frameworks for understanding and operationalizing engagement and building enduring connections with your networks and communities. 2023-06-2123 minISACA PodcastISACA PodcastDelivering Security Value to Product Teams Using the Power of DataIn security, aligning with product teams has never been more important, especially when outmaneuvering adversaries. To foster a truly productive and action-oriented cybersecurity culture, security teams must begin addressing their product engineering counterparts as customers they serve rather than entities they govern. In this podcast, ISACA’s Chris McGowan listens in as Adobe’s Manager of Adversary Intelligence Gurpartap “GP” Sandhu provides unique insight into how he’s bringing intrapreneurship to life in product security through a key project that delivers actionable data that product teams can use to enhance their security posture more rapidly. They’ll al...2023-06-1322 minISACA PodcastISACA PodcastAI Ethics and the Role of IT AuditorsWe, as a society, have always lived by certain norms that are driven by our communities. These norms are enforced by rules and regulations, societal influence and public interactions. But is the same true for artificial intelligence (AI)? In this podcast we discuss and explore the answers to some of the key questions related to the rapid adoption of AI, such as: What are the risks associated with AI and the impact of its increasing adaption within almost every industry? And, what role should we as IT Auditors should play in this fast changing technological landscape? 2023-06-0630 minISACA PodcastISACA PodcastUsing a Risk-Based Approach to Prioritize Vulnerability RemediationOrganizations today struggle with vulnerability management. More specifically, remediating vulnerabilities in a timely manner poses a challenge. With vulnerability remediation backlogs growing at an alarming rate, what can organizations do to meet their established remediation timelines and to protect the organization from cybersecurity threats. Cybersecurity leader Ray Payano will discuss the exponential increase in published vulnerabilities, the lack of resources in cybersecurity to perform remediation and balancing remediation with reduced maintenance windows. These challenges contribute to organizations struggling with remediation backlogs. Ray will explain how calculating vulnerability risk can help organizations prioritize their vulnerabilities based on risk level to...2023-06-0127 minISACA PodcastISACA PodcastThe True Cost of a Data BreachGuests Jack Freund and Natalie Jorion discuss the need for additional data for quantitative risk analyses and methods to derive that data when it does not exist. They cover how this was done in the past and their updated method for interpolation of such data from record losses and other firmographic data. They end with a discussion of the role of model validation and how it can enable reliable risk management decision making. Hosted by ISACA's Safia Kazi. 2023-05-2331 minISACA PodcastISACA PodcastSeven Things to Know Before Automating IT General Control AuditsThis podcast is a practical discussion with two IT Internal Auditors, Frans Geldenhuys and Gustav Silvo, that have automated IT General Controls across their highly diversified and decentralized group. They will share some of the pitfalls they have experienced in their automation roll out and advise on how to avoid or manage these pitfalls with host, Robin Lyons. Check out Frans and Gustav’s full ISACA Industry News article, “Seven Things to Know Before Automating IT General Control Audits,” http://www.isaca.org/automating-it-general-control-audits For more ISACA Podcasts, https://www.isaca.org/podcasts   2023-04-2733 minISACA PodcastISACA PodcastUnderstanding, Assessing, Aligning and Transforming Organizational CultureOrganizational culture is crucial because it shapes behaviors and attitudes in the workplace, which can profoundly impact operations and overall success. However, it is sometimes difficult for CISOs and other infosec managers to fully understand their culture because they are inside it constantly. In this ISACA Podcast episode, author and journalist Mark Tarallo chats with ISACA's Safia Kazi about how infosec managers can assess the organizational culture by using a culture model to examine the behaviors, relationships, attitudes, values, and environment that the culture sustains. It also discusses possible ways to lead a culture change initiative. 2023-04-2029 minISACA PodcastISACA PodcastIndustry Spotlight - Julia KanouseGet to know Chief Membership and Marketing Officer Julia Kanouse as she sits down with childhood best friend and ISACA VP Amanda Raible. The duo discuss everything from leadership to motherhood while competing in Mario Kart! Tune in! 2023-04-1121 minISACA PodcastISACA PodcastWhat Is Your IP Address Cybersecurity IQ? The Role of IP Address Data in a Digital WorldThere are literally thousands of VPN services on the market. Some are undeniably benign, but others offer a slate of features that are friendly to cyber criminals. Keeping your network safe from hackers requires you to understand the VPN market, and make decisions based on your company’s appetite for risk. Fortunately, by analyzing IP address data associated with these devices, security professionals can get access to a wealth of VPN contextual data that helps them distinguish between perfectly legitimate providers and those that turn a blind eye toward crime. In today’s world, it is vital for security prof...2023-04-0428 minISACA PodcastISACA PodcastThe Future of Technology Risk: 4 Ways to Build Stakeholder Trust in the Technology Risk ImperativeToday, the pace of change across industries is quicker than ever before. Economic, political, and social unrest and a global climate crisis have placed unprecedented disruption and pressures on organizations looking to navigate a rapidly changing environment. Firms are being out-innovated and entire industries are being disrupted in a matter of months or years, as opposed to decades. Shifting regulations, data as an asset, dynamic customer behavior and employee expectations of continued flexibility in a more virtual workplace add to the challenge. Technology risk and compliance needs to adjust to this new reality. The strategy...2023-03-2125 minISACA PodcastISACA PodcastMeasuring Security Resilience from the Lens of the Adversary CommunityIn a world where adversaries are constantly adapting to improve tactics, techniques, and procedures (TTPs), it is crucial to understand the unique traits and goals of various types of adversaries that actively seek to cause harm to an organization. The personification of these threats will ultimately help measure resilience against specific threat actors, identify investment and hardening opportunities, and improve trust with customers. In this podcast, Daniel Ventura, Manager of Product Security Incident Response Team (PSIRT), shares insight into Adobe’s approach to adversary personification as well as provides guidance on how you can better measure the se...2023-03-1421 minISACA PodcastISACA PodcastRisky Business – Jon BrandtFor the average person, life moves quickly. But for business leaders and anyone involved in any aspect of IT, the pace at which technology is changing is overwhelming. Technology can help businesses and individuals do more with less and increase profit margins. However, technological advances carry tremendous risk and increase the criticality of risk management. No longer can business and personal use of technology be viewed in siloes. ISACAs Director of Professional Practices and Innovation, Jon Brandt, is joined by Ryan Cloutier as they discuss some of the latest headlines and impact to intellectual property. 2023-03-0749 minISACA PodcastISACA PodcastBuilding Digital Trust Through AdvocacyIf you thought ISACA was only about certification and education, get ready to listen to this podcast and see how ISACA advocates for the IT Audit and Risk Management professions! Join Cindy Baxter, author of the Audit in Practice column in the ISACA Journal, as she interviews two members of the ISACA New England Board of Directors who attended ISACA’s Hill Day in Washington DC.  Hear how they met with their government representatives and with ISACA’s help, discussed legislation that supports our profession!  It’s an opportunity to think about the impacts you can have in your own back...2023-03-0228 minISACA PodcastISACA PodcastAdvertising Information SecurityIn this episode, executive principal at Risk Masters International’s Steven Ross discusses why vendors of IT products and services are advertising information security, why businesses are not advertising their security and how to use information security as a component of organizations’ public images with host Safia Kazi. 2023-02-2822 minISACA PodcastISACA PodcastRethinking Identity GovernanceSaaS is eating the world even more than we think. Companies are dealing with SaaS sprawl: hundreds of apps distributed across different owners that store sensitive data and which are used to orchestrate critical business workflows. Security-minded teams are turning to external compliance frameworks to help protect their customers and data.   However, traditional identity governance controls have fallen short of delivering real security outcomes in this digital-first world. They’re missing a critical piece: automation. In this episode, ConductorOne’s CEO and Co-Founder, Alex Bovee joins this episode to discuss why we need to change the way we th...2023-02-2127 minISACA PodcastISACA Podcast2023: The Year of Risk A review of the events of 2022 shows that 2023 will not be the year of dire new cyber attacks waged by hoodie-wearing cyber criminals or office-bound nation-state APTs. Instead, 2023 will be when multiple regulatory bodies express their mounting frustration with public and private companies' collective inability to reduce the volume and impact of prior cyber attacks.   Tune into this ISACA Episode as Hyperproof’s Field CISO, Kayne McGladrey, speaks with ISACA’s Jeff Champion on how 2023 will be the year of risk.   Learn more about Hyperproof at:   https://twitter.com/Hyperproof  https://www.linkedi...2023-02-1442 minISACA PodcastISACA PodcastImproving Cyber Resilience in an Age of Continuous AttacksWe live in the age of continuous compromise. This podcast dives into why so many organizations continue to be breached even after spending money on cybersecurity point solutions. Many organizations gravitate towards silver bullet solutions without understanding the threat and impact. In this ISACA Podcast episode, Chris McGown speaks to Rex Johnson and Hamlet Khodaverdian about why a holistic and collaborative approach is absolutely critical to creating cyber-resilience.  For more information check out www.isaca.org/improving-cyberresilience-in-an-age-of-continuous-attacks  2023-02-0932 minISACA PodcastISACA PodcastAdvancing Digital Trust Through Audit and AssuranceA strong audit and assurance function is critical to achieving digital trust in an organization. This conversation spotlights audit's role in digital trust and outlines key priorities. It also shares new ISACA resources for auditors. For more information, go to https://isaca.org/digital-trust 2023-02-0725 minISACA PodcastISACA PodcastISACA Live_Critical Infrastructure SecurityISACA's Chris Dimitriadis and the US GAO's Nick Marinos discuss the current state of critical infrastructure security, escalating threats and how to better prepare. For more information check out www.isaca.org/heightened-threats 2023-02-0226 minISACA PodcastISACA PodcastISACA Live | Risk ScenariosPaul Philips and Lisa Young will discuss how risk scenarios help decision-makers understand how certain events can impact organizational strategy and objectives. Good risk scenario building is a skill and can take some time to truly master. Paul and Lisa will provide actionable advice on building the best possible scenarios to help your organization better manage risk For more information check out https://www.isaca.org/resources/it-risk 2023-01-3122 minISACA PodcastISACA PodcastISACA Live | How to Mature Your Privacy Compliance ProgramCompliance with the world’s ever-increasing list of privacy laws can be a tricky undertaking for any organization, but by taking a few simple steps, you can begin to mature your privacy program from a series of check-box exercises into an intelligent compliance program that can help organizations to build consumer trust and protect brand reputation. Join this conversation with OneTrust DPO Linda Thielova and ISACA's Paul Phillips to learn how to operationalize privacy compliance within your organization and get practical tips on how to mature your privacy compliance program. 2023-01-2626 minISACA PodcastISACA PodcastCareer Coach Advice: How to Launch Your IT Audit CareerCareer coach Caitlin McGaw will share her top tips for young professionals and career changes on how to launch a successful career in IT audit--from acing your first interview and landing your first job to career resources to help your career continue to grow and thrive. To learn more, check out www.caitlinmcgaw.com  2023-01-2418 minISACA PodcastISACA PodcastISACA Live | Advancing Digital Trust Through Data PrivacyLearn more at isaca.org/digital-trust  2023-01-1916 minISACA PodcastISACA PodcastISACA Live | The Dark Future of PrivacyPrivacy Mining will increase because of billions of IoT devices being connected every day. Combined with advanced psychologic research, this can be a very powerful tool for manipulating people's behavior. A Fake reality also poses a big threat to our future of privacy. Software, such as Deep Fakes, has the ability to use someone's facial structure and create fake videos featuring digitally created characters with an uncanny resemblance of real people, such as celebrities. This technology is so advanced, that our minds aren't sophisticated enough to comprehend the difference between real and fake data created by it...2023-01-1730 minISACA PodcastISACA PodcastInformation Privacy Contradiction: Interest-Based Posture of Compliance and ViolationWhy do individuals, organizations, institutions, nations, or responsible agents work hard to preserve their personal and enterprise data, personnel information, trade secrets, intellectual properties, technical know-how, or national data, yet easily trade on the individual and enterprise data and national data of others? To understand and answer the question appropriately, one must examine the underlying of the Information Privacy Realities Contradiction Theory (IPRCT), which is integral to (1) our natural unity of opposites, (2) our material dialectic mechanism or struggle of choosing from the opposites, and (3) the role of our self-interest in time and circumstance. Therefore, understanding the intricacies...2023-01-1232 minISACA PodcastISACA PodcastISACA Live | Advancing Digital Trust Through ITOn National IT Professionals Day, ISACA's Kevin Keh explains how IT professionals can advance digital trust in their organizations and in their industries. Learn more at isaca.org/digital-trust  2023-01-0512 minISACA PodcastISACA PodcastShould Cybersecurity Be Subject to a SOX-Type Regulation?Numerous laws and regulations have been passed to protect sensitive information, both at the federal and state level, creating a patchwork of requirements for companies to comply with.  However, with limited resources for cybersecurity investment, this uncoordinated approach has clouded objectives and led to decision paralysis within firms. Could cybersecurity implementation benefit from a Sarbanes-Oxley Act (SOX) type approach? In this ISACA Podcast, Senior Director Mike Tomaselli joins ISACA’s Robin Lyons in this episode to discuss how this approach would create a risk-based, internal control model focused on cybersecurity that includes enforcement capabilities and req...2022-12-2923 minISACA PodcastISACA PodcastBeware the Traps of Data Governance and Data Management PracticeGuy Pearce joins ISACA’s Lisa Villanueva for a conversation about the traps of Data Governance and management. Guy breaks down Lore vs. Data, reasons for not using information for decision-making, and why data is a shared benefit for the organization. Stay tuned until the close to hear Guy’s advice on using metaphors when communicating technical concepts to executive leadership. To read Guy's full article, visit: www.isaca.org/beware-the-traps-of-data-governance. To listen to more ISACA podcasts, please visit: www.isaca.org/podcasts. 2022-12-2736 minISACA PodcastISACA PodcastConvergence: Where Next?ISACA’s Jeff Champion welcomes Steven Ross to the ISACA podcast. Steven asks what the effect of Convergence on the Control Community and concludes that everything is connected to every role, and it is becoming risky to have employees siloed within their own practice. He also remarks on how he once wrote an ISACA Journal article about companies creating a role for Chief Security Officer and now that is becoming a reality within the industry. Tune in now! To read Steven’s full-length article, visit: www.isaca.org/convergence-where-next To listen to more ISACA podcasts, visit...2022-12-2222 minISACA PodcastISACA PodcastDo Data Go To WasteThe Impact of SOX on the Industry 20 Years Ago and Today. Opponents of Sarbanes Oxley, (SOX) contend the law is too costly for companies to operationalize given the small benefit that SOX regulation provide. Proponents say that a world without SOX is a world in chaos.  This article discusses how SOX measures up 20 years after the law was enacted. To read Cindy's ISACA Journal article, Do Data Go to Waste, please visit: www.isaca.org/do-data-go-to-waste To listen to more ISACA Podcasts, please visit www.isaca.org/podcasts. 2022-12-2018 minISACA PodcastISACA PodcastProtecting Your Enterprise and Deterring Fraud in a New Risk EraAs uncertainty persists due to the COVID-19 pandemic, the war in Ukraine, international cyberthreats, inflation, and a looming recession, it is clear that the world has entered a new era of risk. These factors have created the perfect storm for rising fraud. In the past year, unauthorized digital account openings increased by 21%, while smartphone-related cyberattacks soared by 71%, reflecting a changing threat landscape impacting enterprises and consumers alike. According to one global survey, nearly half of all respondents experienced fraud in the past 24 months, 3 compromising financial resources, personal data, and peace of mind with frightening rapidity. Recent research...2022-12-1322 minISACA PodcastISACA PodcastThe Circle of Failure: Why the Cyber Security Industry Doesn’t WorkRichard Hollis, Director of Rick Crew, is serious about asking the tough questions. ISACA’s Jon Brandt welcomes him to the ISACA podcast to have a conversation that challenges the status quo: Does the Cyber Security Industry work? After decades of experience in the security industry, Richard asks, “have I affected any change?” Richard points out that if we buy a toaster at the store and it doesn’t work, we return it, but as security professionals, we don’t hold products to the same standards. Why is this? Jon and Richard go back and forth on FUD, vendo...2022-12-0950 minISACA PodcastISACA PodcastMeeting Attackers Where They AreThe world's largest software companies leverage modern-day Red Teams to protect against real-world attacks. Many companies focus on vulnerability management, compliance, and patching to secure themselves, but this is only a tiny part of the big picture. An improved security posture is achieved by leveraging the Red Team to pressure test the attack surface and discover the impact that can be made by actively exploiting the soft spots of the company. In this podcast, Justin Tiplitsky, Director of the Red Team at Adobe, talks about how his team uses adversary intel to perform continuous testing on the...2022-11-2922 minISACA PodcastISACA PodcastTaking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CKIn an era of rampant ransomware and other malicious cyberattacks, it’s mandatory to double down on cybersecurity analysis and strategy to ensure an optimal security posture and the protection of critical assets and data. Today, two models can help security professionals harden network resources and protect against modern-day threats and attacks: the cyber kill chain (CKC)and the MITRE ATT&CK framework. Tim Liu, long-term security technologist, co-founder, and CTO, will provide an overview of these two frameworks and the limitations or benefits of each approach.  To read Taking Security Strategy to the...2022-11-2223 minISACA PodcastISACA PodcastAuditee Buy-In—A Key Component of Effective AuditsAs you plan and execute your audit, do you take time to invest in the stakeholder relationship? This can be an often-overlooked element but essential in an effective audit. Tune into this ISACA Podcast as Steve Jackson, IT Audit Manager at Airbnb, chats with ISACA’s Robin Lyons about ways to gain auditee buy-in and have a successful and effective audit. To read Steve’s full-length article, “Auditee Buy-In—A Key Component of Effective Audits,” visit www.isaca.org/auditee-buy-in To watch the ISACA Video Podcast of this episode, visit, https://youtu.be/nWFcXC24ue...2022-11-1020 minISACA PodcastISACA PodcastBreaking Down the ESET T2 2022 Threat Report In this ISACA Podcast episode, ESET’s Chief Security Evangelist, Tony Anscombe, joins ISACA’s Principal, Emerging Technology Professional Practices, Collin Beder to discuss ESET’s recently released T2 2022 Threat Report. As a global leader in cybersecurity, ESET’s T2 2022 Threat Report summarizes the most notable trends that have shaped the threat landscape for the past four months. This report dives into CloudMensis, the previously unknown macOS malware discovered by ESET researchers. To read the full ESET report: https://www.welivesecurity.com/wpcontent/uploads/2022/10/eset_threat_report_t22022.pdf. For more information, check out ESET’...2022-11-0821 minISACA PodcastISACA PodcastEnabling Digital Trust through Canada’s Digital CharterData are the lifelines of a digital economy. They drive innovation, enabling cutting-edge research and next-generation technologies, including artificial intelligence (AI), robotics, and the Internet of things (IoT). But these opportunities introduce new sources of risk that must be managed appropriately. Canadians are raising important questions such as, “How will personal data be used?” and “What controls are in place to safeguard privacy and security?”  To encourage innovation within the digital economy while managing this risk, the Government of Canada has established the need for digital trust between citizens and organizations as an enabler by implementing a Digital C...2022-11-0425 minISACA PodcastISACA PodcastIt’s About (Down) TimeIt is all about the system's downtime. In this ISACA Podcast episode, Risk Masters International's Steven Ross tells ISACA's Collin Beder that organizations should start focusing on hours of unavailable systems and data when measuring the cost of a cyber-attack. Steven also discusses the causes and targets of system downtime and why he thinks the IT world is currently living in a dangerous time.   To read Steven's full-length article, visit www.isaca.org/its-about-down-time. To listen to more ISACA Podcasts, visit www.isaca.org/podcasts. 2022-11-0114 minISACA PodcastISACA PodcastHow Social Engineering Bypasses Technical ControlsWe are subjected to phishing scams almost every day, and even the most seasoned professional must examine an email to ensure the links included are safe. Brown University and Federal Reserve Bank of Cleveland's Allen Dziwa says people are the weakest link and that customized messaging using regional language for targeted attacks is becoming more prevalent. Allen breaks down the many types of attacks (phishing, spear phishing, smishing, vishing, whaling) with ISACA's Kevin Keh. Tune in now to learn how to be vigilant when facing potential attacks from scammers. To read Allen’s full article, pl...2022-10-2715 minISACA PodcastISACA PodcastWhat Makes Risk Assessments So Unpleasant and How to Change ThatRyan Cloutier's child came home from school one day and told him that he had figured out the staff Wi-Fi password. Frustrated that the security wasn't better for a school network, Ryan decided to do something about it. Since then, his career has been focused on serving K12, local government, and socio-economically disadvantaged communities with his company Security Studio. ISACA's Jeff Champion asks him about ways to overcome technical language barriers when completing risk assessments and Ryan discusses key issues with risk assessments and a path forward to resolving them. Tune in to start thinking about more...2022-10-2623 minISACA PodcastISACA PodcastISACA CyberPros – Naomi BuckwalterExecutive Director of Cybersecurity Gatebreakers Foundation, Naomi Buckwalter, joins ISACA’s Jon Brandt to discuss burnout. There are many factors at play when discussing burnout: company culture, work-from-home flexibility, unrealistic expectations from supervisors, and industry pressure, but Naomi gives you multiple action plans for combatting workplace burnout and creating healthy boundaries with your colleagues. Tune into this ISACA Podcast now! To learn more about Naomi, please visit: https://www.linkedin.com/in/naomi-buckwalter/ To listen to more ISACA podcasts, please visit: www.isaca.org/podcasts 2022-10-2140 minISACA PodcastISACA PodcastQuantifying the Qualitative Risk AssessmentIn this ISACA podcast episode, IT Risk Director and Senior Vice President Mike Powers and IT Segment Risk Manager Julie Ebersbach discuss using the qualitative risk assessment as part of an organization's enterprise risk framework, focusing on using data to inform subjective judgments.  The value and accuracy of a qualitative risk assessment, based on subject matter expert judgment, can be improved with focused data. Tune in now to hear Mike and Julie chat with ISACA's Jeff Champion about how quantifiable data increases the qualitative risk assessment's reliability, accuracy, and credibility. To read ISACA Journal article, Q...2022-10-1827 minISACA PodcastISACA PodcastGaining More Actionable Intelligence Using a Smarter Security Data LakeIn today’s dynamic world of distributed computing and cloud-scale systems, traditional security data platforms and tools such as SIEM typically fall short of actually delivering the intelligence needed to better adapt to the rapidly changing threat landscape. This is primarily due to a lack of core data lifecycle management, analytics, and integration capabilities. In addition to closing these functional gaps, security organizations could benefit by making AI/ML-driven advanced analytics a core component of their security intelligence capabilities. While there is admittedly a lot of hype around the concept of a “security data lake” in the industry, most approa...2022-10-1336 minISACA PodcastISACA PodcastISACA Industry Spotlight | Ali PabraiThere is no denying the passion that ecfirst's CEO, Ali Pabrai has for cybersecurity. In this ISACA Podcast, Ali tells ISACA's Hollee Mangrum-Willis that after all his years in the industry, he is still more excited than a two-year-old at the entrance to Disneyland. Listen in as Ali discusses his origin story as a first-generation American working for Fermi National Accelerator Laboratory, creating a startup soon after the new millennium and how he has balanced all his career accomplishments while raising a neurodivergent child. Tune in now to hear about why Ali thinks we should compare the...2022-10-1140 minISACA PodcastISACA PodcastManaging Cybersecurity Risk as Enterprise RiskCybersecurity incidents like ransomware can potentially bring operations to a standstill. Recent regulatory changes by the FTC and proposed changes by the SEC show that both agencies are drafting cybersecurity rules similar to ERM concepts. This would include board oversight of cybersecurity and the responsibility of senior management to implement cybersecurity policies and procedures and provide training for information security staff that is sufficient for them to address relevant security risks. In addition, this could mean that your organization may be required to report incidents and disclose cybersecurity policies and procedures. Tune in to this ISACA Podcast...2022-10-0618 minISACA PodcastISACA PodcastImplementing Artificial Intelligence: Capabilities and RiskUniversity of Florida's Ivy Munoko is passionate about AI and has plenty to share regarding implementation and usage, but ISACA's Collin Beder asks, "is it ethical"?  Ivy breaks down the ethical considerations for AI and the four types of intelligence (Mechanical, Analytical, Intuitive, Empathetic), and she shares her take on why she thinks AI won't be replacing our jobs for a very long time to come To read Ivy's article, please visit www.isaca.org/implementing-ai-capabilities-and-risk. To listen to more ISACA Podcasts, please visit www.isaca.org/podcasts.  2022-10-0435 minISACA PodcastISACA PodcastAudit in Practice: Auditing CultureWhat’s The Risk LLC’s Cindy Baxter sits down with ISACA’s Robin Lyons to discuss auditing culture, which can be one of the most interesting areas to audit. We all have things we want out of our work environment like remote work, flexible hours or as Cindy comments: “I’d love to take my dog to work with me!”, but she and Robin question what is really important to workplace culture, and does it start with a “tone at the top”? Cindy gives advice on auditing approaches and key assessments when auditing as culture can be a critical part of...2022-09-2933 minISACA PodcastISACA PodcastIncident Report & Continuous Control MonitoringThis episode of the ISACA Podcast is all about incident reporting. Lesotho Postbank's Relebohile Kobeli talks to ISACA's Collin Beder about mitigating risk, minimizing losses from events, and good communication. As Relebohile says: "as we carry out our daily tasks at work, we should always be proactive... and recognize abnormal behavior". Tune in now! To read Relebohile's full article, please visit: www.isaca.org/how-enterprises-can-leverage-incident-reporting  To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts  2022-09-2716 minISACA PodcastISACA PodcastIndustry Spotlight - Lisa YoungNetflix's Lisa Young started as a bank teller that learned tech by fixing and servicing ATMs, which transitioned to her joining the network ops field and leading her to "help organizations understand what could keep them from meeting their strategy, objectives or mission". After rough telecom layoffs, she re-educated herself with ISACA certifications and started leading a chapter, which included the honor of hosting an ISACA conference and she has developed content with ISACA's Paul Phillips. In this episode she sits down with Paul to discuss their shared work on ISACA-related projects, cyber careers and why you should be...2022-09-2218 minISACA PodcastISACA PodcastDefending Data SmartlySome industry watchers estimate that by 2025 the collective data of humanity will reach 175 Zettabytes. ISACA's Jon Brandt invites Dr. Chase Cunningham (aka Dr. Zero Trust) to discuss how to defend the ever-growing amount data, problem-solving for business units and compliance. Chase also questions the idea of “never compromise” and “perfect defense” when defending data. Tune in now! To Learn more about Dr. Zero Trust, visit: www.zerotrustedge.com/dr-zero-trust To listen to more ISACA Podcasts, visit: www.isaca.org/podcasts  2022-09-2023 minISACA PodcastISACA PodcastFoco de la industria - Arnulfo Espinosa Dominguez Parte IIParte I: https://isacapodcast.podbean.com/e/foco-de-la-industria-arnulfo-espinosa-dominguez/ El vicepresidente del Capítulo Monterrey de ISACA y Director de Auditoría y Fraude de TI de uno de los Grupos Financieros más grandes de México, Arnulfo Espinosa Domínguez, se une a Jocelyn Alcantar de ISACA para compartir muchas cosas que ha aprendido durante sus 20 años de experiencia profesional en la industria. Habiéndose dado cuenta del valor de la información a una edad temprana, Arnulfo ha forjado su camino dentro de la comunidad de TI. Es un formador acreditado para múltiples certifica...2022-09-1631 minISACA PodcastISACA PodcastEthical AI Shifting the Conversation LeftMany organizations prioritize goals such as gains and profits, which often require rich data sets, but fail to consider the eventual impact of their data handling methodologies on foundational social justice issues. ISACA's Collin Beder talks to Josh Scarpino about his recently released article Evaluating Ethical Challenges in AI and ML. Josh discusses issues such as ethical behavior, systemic issues and how to create trusted systems. Collin also asks what is the future for humans in regards to AI. Tune in now! To read Evaluating Ethical Challenges in AI and ML, visit: www.isaca.org/evaluating-ethical-challenges-in-ai-and-ml 2022-09-1517 minISACA PodcastISACA PodcastFoco de la industria - Arnulfo Espinosa Dominguez Parte IParte II: https://isacapodcast.podbean.com/e/foco-de-la-industria-arnulfo-espinosa-dominguez-parte-ii/ El vicepresidente del Capítulo Monterrey de ISACA y Director de Auditoría y Fraude de TI de uno de los Grupos Financieros más grandes de México, Arnulfo Espinosa Domínguez, se une a Jocelyn Alcantar de ISACA para compartir muchas cosas que ha aprendido durante sus 20 años de experiencia profesional en la industria. Habiéndose dado cuenta del valor de la información a una edad temprana, Arnulfo ha forjado su camino dentro de la comunidad de TI. Es un formador acreditado para múltiples certifica...2022-09-1432 minISACA PodcastISACA PodcastWhy (And How to) Dispose of Digital DataThe stakes are too high for organizations not to comply with data privacy regulations,” Bassel Kablawi states in his article, "Why (and How to) Dispose of Digital Data." As the Information Security and Data Privacy Consultant for System Solutions, Bassel Kablawi has the knowledge and experience to determine that the value of data disposal can help an organization protect personal data from being exposed and why the final step in the Data Lifecycle could be considered the most crucial. Bassel takes us on a deep dive into digital data with ISACA's Safia Kazi on the five stages of...2022-09-1317 minISACA PodcastISACA PodcastIndustry Spotlight - Johann Dettweiler Part IILink to Part I: https://isacapodcast.podbean.com/e/industry-spotlight-johann-dettweiler-part-1/ In this ISACA podcast episode, we connect with TalaTek Director of Operations Johann Dettweiler to discuss his almost two decades of experience across multiple industry fields, his involvement in FEDRAMP compliance, and why the next generation should focus on adding certifications to their resumes. Johann tells ISACA's Keith Karlsson that it was his work ethic and guidance of a trusted mentor that provided an opportunity in the IT security field. In less than 12 months, he racked up multiple impressive certifications such as CISSP, CCSP, and...2022-09-0821 minISACA PodcastISACA PodcastIndustry Spotlight - Johann Dettweiler Part ILink to Part II: https://isacapodcast.podbean.com/e/industry-spotlight-johann-dettweiler-part-ii/ In this ISACA podcast episode, we connect with TalaTek Director of Operations Johann Dettweiler to discuss his almost two decades of experience across multiple industry fields, his involvement in FEDRAMP compliance, and why the next generation should focus on adding certifications to their resumes. Johann tells ISACA's Keith Karlsson that it was his work ethic and guidance of a trusted mentor that provided an opportunity in the IT security field. In less than 12 months, he racked up multiple impressive certifications such as CISSP, CCSP, and...2022-09-0636 minISACA PodcastISACA PodcastAchieving Effective Cloud Risk ManagementCloud is ubiquitous now. From small enterprises to large companies, all are moving a part of their technology operations to cloud. Initial reluctance is now nowhere to be seen. There is more confidence among the user for the use of cloud technology. Join ISACA’s Jeff Champion as he talks with Risk and Control Specialist, Upesh Parekh about cloud deployment models, the various risks involved with cloud storage, and what to know when using cloud technology for an organization. Read Achieving Effective Cloud Risk Management at: www.isaca.org/achieving-effective-cloud-risk-management Listen to more ISACA Podcasts at...2022-09-0126 minISACA PodcastISACA PodcastIndustry Spotlight - Dr. Blake Curtis Part IILink to Part I: https://www.podbean.com/media/share/pb-agrfe-12a9555 Author, editor, speaker, and educator, Dr. Blake Curtis is joined by Red Cross’s Senior Internal Auditor Niki Gomes to talk about everything from growing up in a small town to completing his master’s degree in 10 weeks and publishing his 600-page dissertation in this ISACA Industry Spotlight episode. In a meaningful conversation, Blake discusses how surviving a near-death experience transformed and motivated him to expand his understanding of what it means to be a human. He was inspired to supercharge his learning, care...2022-08-3038 minISACA PodcastISACA PodcastIndustry Spotlight - Dr. Blake Curtis Part ILink to Part II: https://www.podbean.com/media/share/pb-ma96i-12af3bf Author, editor, speaker, and educator, Dr. Blake Curtis is joined by Red Cross’s Senior Internal Auditor Niki Gomes to talk about everything from growing up in a small town to completing his master’s degree in 10 weeks and publishing his 600-page dissertation in this ISACA Industry Spotlight episode. In a meaningful conversation, Blake discusses how surviving a near-death experience transformed and motivated him to expand his understanding of what it means to be a human. He was inspired to supercharge his...2022-08-2532 minISACA PodcastISACA PodcastIndustry Spotlight - Arnulfo Espinosa Dominguez Part IILink to Part I: https://isacapodcast.podbean.com/e/industry-spotlight-arnulfo-espinosa-dominguez-part-i/ Vice President of the ISACA Monterrey Chapter and IT Audit & Fraud Director of one of the largest Financial Groups in México, Arnulfo Espinosa Dominguez, joins ISACA’s Jocelyn Alcantar to share some of the many things he has learned over his 20 years of professional experience in the industry. Having realized the value of information at an early age, Arnulfo has forged his path within the IT community. He is an accredited trainer for multiple certifications, an independent advisor and chairman for various Cybersecurity, Risk, and Audit com...2022-08-2327 minISACA PodcastISACA PodcastIndustry Spotlight - Arnulfo Espinosa Dominguez Part ILink to Part II: https://isacapodcast.podbean.com/e/industry-spotlight-arnulfo-espinosa-dominguez-part-ii/ Vice President of the ISACA Monterrey Chapter and IT Audit & Fraud Director of one of the largest Financial Groups in México, Arnulfo Espinosa Dominguez, joins ISACA’s Jocelyn Alcantar to share some of the many things he has learned over his 20 years of professional experience in the industry. Having realized the value of information at an early age, Arnulfo has forged his path within the IT community. He is an accredited trainer for multiple certifications, an independent advisor and chairman for various Cybersecurity, Risk, and Audit com...2022-08-1830 minISACA PodcastISACA PodcastCurrent State of Cybersecurity in K12ISACAs Director of Professional Practices and Innovation Jon Brand hosts Doug Levin, co-founder and National Director of K12 Security Information eXchange (K12 SIX), a national non-profit dedicated solely to helping schools protect themselves from emerging cybersecurity threats. Levin's work includes development and implementation of the nations initial and subsequent technology plans and well as creation of K-12 Cyber Incident Map, the most comprehensive database of publicly-disclosed K-12 cybersecurity incidents. Throughout this episode they discuss the often unique challenges for the underrepresented sector of U.S. critical infrastructure and current initiatives to bolster K-12 cybersecurity and privacy. For...2022-08-1648 minISACA PodcastISACA PodcastIndustry Spotlight - Todd FitzgeraldCybersecurity leader, author, and host of the CISO Stories podcast, Todd Fitzgerald sits down with ISACA’s Chelsey Byrd to discuss his extensive career journey in security, his best-selling book, CISO COMPASS, and how a make-believe FBI club connects directly to his career passions today. As one of ISACA’s top-rated speakers, Todd gives tips and techniques for the best way to prepare for a speaking event, how to engage the audience, and some entertaining moments and behind-the-scenes accounts from conferences! Named the Chicago CISO of the Year and ranked Top 50 IS Executive in 2016 and 2017, Todd...2022-08-1136 minISACA PodcastISACA PodcastAdvancing Digital Trust Through Audit and AssuranceA strong audit and assurance function is critical to achieving digital trust in an organization. This conversation spotlights audit's role in digital trust and outlines key priorities. It also shares new ISACA resources for auditors. For more information, go to https://isaca.org/digital-trust 2022-08-0925 min