Jorge Carrillo, who has earned more ISACA certifications than anyone in the world, says the lessons he has learned from his numerous credentials extend well beyond the exam content.
At the ISACA® North America Conference, hundreds of cybersecurity and audit professionals gathered for ISACA's first ...
Join ISACA’s Advanced in AI Risk (AAIR) beta program, the credential for experienced IT risk professionals managing emerging ...
ROI Example: AI Implementation in a Retail Chain A large retail chain implements an AI-driven inventory management system to optimize its supply chain. The system uses algorithms to predict stock ...
At first glance, the topics of cybersecurity and environmental, social and governance (ESG) initiatives seem a bit distant from one another. Despite several sources publishing their linkages (e.g., ...
ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber ...
As the world becomes increasingly reliant on technology, the attack surface of cyberspace continues to expand. Cyberthreats have grown more sophisticated, posing significant risk to individuals, ...
Author: Ejona Preçi, CISM, CRISC, ITIL v4, and Peter H. Gregory, CISA, CISM, CRISC, CDPSE, CCSK, CISSP, DRCE ...
Author: Andre Pitkowski, CRISC, CGEIT, COBIT Foundation Trainer, CRMA, ISO 27001 LA, ISO 31000 LA, OCTAVE, Scrum PSM, and Daniel Bispo de Jesus, COBIT 5 Foundation ...
Author: Mary Carmichael, CRISC, CISA, CPA, Member of ISACA Emerging Trends Working Group ...
Organizations aim to achieve their objectives while managing risk within their risk appetites. A good governance structure for managing risk is to establish three lines of defense. Briefly, the first ...
As enterprises grow larger and become more reliant on external vendors, it becomes necessary to establish effective vendor management programs. Vendor management is a fundamentally critical function ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results