Podcast Featured Podcast

New!  The State of Cybersecurity
With the increasing number of connected devices, the need for skilled cybersecurity professionals is even greater. In this podcast, we discuss the most common cybersecurity threats, the skills gap and how the skills gap can be remediated.

Podcast 2018 Podcasts


The State of Cybersecurity
ISACA 50th Anniversary Series: The Impact of Automation and Robotics
SheLeadsTech Series: Mentors and Role Models in the Tech Workforce
ISACA Journal Volume 2:  Applying a Technological Integration Decision Framework to Innovation Governance  (View Article)
Reasonable Software Security Engineering  (View Perspectives Article)
ISACA Journal Volume 2:  Disaster Recovery Management in the Multimodal Era  (View Article)
ISACA Journal Volume 1:  Managing Availability in the Multi-Modal Era  (View Article)
ISACA Journal Volume 1:  Mistakes Happen—Mitigating Unintentional Data Loss  (View Article)
Meltdown and Spectre Vulnerabilities


Podcast 2017 Podcasts


ISACA Journal Volume 6:  Governance, Risk, Compliance and a Big Data Case Study  (View Article)
ISACA Journal Volume 5:  Anatomy of an IoT DDoS Attack and Potential Policy Responses  (View Article)
ISACA Journal Volume 5:  Information Security in the Multi-Modal Era  (View Article)
ISACA Journal Volume 4:  Social Media Rewards and Risk  (View Article)
Sustainability (View White Paper)
Implementing the NIST Cyber Security Framework (View White Paper)
COBIT 5 Principles: Where Did They Come From? (View White Paper)
ISACA Journal Volume 1:  The Automation Conundrum  (View Article)


Podcast 2016 Podcasts


ISACA Journal Volume 6:  Performance Measurement Metrics for IT Governance  (View Article)
ISACA Journal Volume 6:  The G7 and Cyber Security  (View Article)
ISACA Journal Volume 5:  Unsung Security Heroes  (View Article)
ISACA Journal Volume 5:  Balancing the Cybersecurity Battlefield  (View Article)
ISACA Journal Volume 4:  Chief Cyber Officer  (View Article)
ISACA Journal Volume 4:  Benefits and the Security Risk of Software-defined Networking  (View Article)
ISACA Journal Volume 3:  Challengeable Truths  (View Article)
ISACA Journal Volume 3:  Protecting Information—Practical Strategies for CIOs and CISOs  (View Article)
ISACA Journal Volume 2:  Weary Willie’s Guide to Cyberrisk Management  (View Article)
ISACA Journal Volume 2:  Auditing Agile—A Brave New World Podcast  (View Article)
ISACA Journal Volume 1:  Why Everyone Dislikes the IT Auditor and How to Change It  (View Article)
ISACA Journal Volume 1:  Cyber/Privacy  (View Article)


Podcast 2015 Podcasts


ISACA Journal Volume 6:  Cybersecurity for a “Simple” Auditor   (View Article)
ISACA Journal Volume 6:  The Criticality of Security in the Internet of Things  (View Article)
ISACA Journal Volume 5:  Stanley Baldwin’s Bomber  (View Article)
ISACA Journal Volume 5:  Addressing Cybersecurity Vulnerabilities  (View Article)
ISACA Journal Volume 4:  Are Software Flaws a Security Problem?  (View Article)
ISACA Journal Volume 4:  Three Ways to Simplify Auditing Software Security Requirements and Design  (View Article)
ISACA Journal Volume 3:  Frameworkers of the World, Unite II  (View Article)
ISACA Journal Volume 2:  Cyberwhatsit  (View Article)
ISACA Journal Volume 1:  Microwave Software  (View Article)