
ISACA unveils Risk Scenarios Starter Pack and course to help practitioners identify relevant risks
One of the challenges for IT risk management is to identify important and relevant risk, and one of the best ways to do that is through a well-developed risk scenario …
IT pros are not very confident in their organization’s supply chain security
Over the last two years, supply chain challenges have rocked both enterprises and consumers alike, making it harder to access certain goods and maintain business continuity. …

How confident are IT pros in the security of their organization’s supply chain?
Over the last two years, supply chain challenges have rocked both enterprises and consumers alike, making it harder to access certain goods and maintain business continuity. …

ISACA Risk Starter Kit provides risk management templates and policies
As enterprises have learned even more acutely over the past few years, managing risk is crucial to minimizing disruption and ensuring business continuity in the face of …

Enterprises are engaged in a powerful battle to retain cybersecurity staff
The Great Resignation is plaguing industries across the board—but it’s especially challenging within in-demand fields like cybersecurity. According to ISACA’s survey report, …

Understaffing persistently impacting enterprise privacy teams
A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …

ISACA releases three audit resources to help professionals keep pace with compliance trends
As the year winds down, many audit professionals are shifting their focus to 2022 priorities—including developing dynamic new strategies such as agile auditing, revisiting …
ISACA unveils two audit programs to improve backup and recovery strategies for organizations
The COVID-19 pandemic spotlighted the need for robust business continuity plans like never before, and also accelerated technology innovation, as organizations quickly sought …
Chris Dimitriadis becomes ISACA’s first Chief Global Strategy Officer
Long-time ISACA member, volunteer and past board chair Chris Dimitriadis has stepped into a new ISACA leadership role as the first chief global strategy officer at the global …

Navigating the 2021 threat landscape: Security operations, cybersecurity maturity
Ransomware attacks have been increasingly in the headlines, and reaching historic levels of impact. Findings from a new report from ISACA in partnership with HCL Technologies …
Tara Wisniewski joins (ISC)² as EVP of advocacy, global markets and member engagement
(ISC)² announced the appointment of Tara Wisniewski to executive vice president, advocacy, global markets and member engagement. In this role, Wisniewski is responsible for …
Marios Damianides joins TrueFort Advisory Board
TrueFort announced that Marios Damianides, former Consulting Partner and Northeast Region Cybersecurity Leader at Ernst & Young, has joined the TrueFort Advisory Board …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility