Ranked #1
Managing Human Risk Requires More Than Just Awareness Training
Managing Human Risk Requires More Than Just Awareness Training
A comprehensive information security awareness program must be in place to ensure that employees are aware of and educat... Read more
26 Jul 2023
•
21mins
Ranked #2
Preparing for Interruptions, Disruptions and Emergence Events
Preparing for Interruptions, Disruptions and Emergence Events
This podcast speaks about how an Information Systems (IS) Auditor can prepare for the Interruptions, Disruptions and the... Read more
19 Jul 2023
•
36mins
Similar Podcasts
Ranked #3
IS Audit in Practice: Data Integrity On Demand
IS Audit in Practice: Data Integrity On Demand
On this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter discuss the disparities between American c... Read more
11 Jul 2023
•
41mins
Ranked #4
ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech
ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech
ISACA Digital Trust Advisory Council Members Anne Toth and Michelle Finneran Dennedy will discuss privacy concerns and p... Read more
28 Jun 2023
•
28mins
Ranked #5
Processes of Engagement with Scott Gould
Processes of Engagement with Scott Gould
Scott Gould is the author of 'The Shape of Engagement: The Simple Process Behind how Engagement Works.' In this podcast,... Read more
21 Jun 2023
•
23mins
Ranked #6
Delivering Security Value to Product Teams Using the Power of Data
Delivering Security Value to Product Teams Using the Power of Data
In security, aligning with product teams has never been more important, especially when outmaneuvering adversaries. To f... Read more
13 Jun 2023
•
22mins
Ranked #7
AI Ethics and the Role of IT Auditors
AI Ethics and the Role of IT Auditors
We, as a society, have always lived by certain norms that are driven by our communities. These norms are enforced by rul... Read more
6 Jun 2023
•
30mins
Ranked #8
Using a Risk-Based Approach to Prioritize Vulnerability Remediation
Using a Risk-Based Approach to Prioritize Vulnerability Remediation
Organizations today struggle with vulnerability management. More specifically, remediating vulnerabilities in a timely m... Read more
1 Jun 2023
•
27mins
Ranked #9
The True Cost of a Data Breach
The True Cost of a Data Breach
Guests Jack Freund and Natalie Jorion discuss the need for additional data for quantitative risk analyses and methods to... Read more
23 May 2023
•
31mins
Ranked #10
2023 IT Compliance and Risk Benchmark Report
2023 IT Compliance and Risk Benchmark Report
Are you wondering about the ever-changing landscape of IT compliance and risk management? Look no further. Hyperproof, a... Read more
16 May 2023
•
24mins