Jorge Carrillo, who has earned more ISACA certifications than anyone in the world, says the lessons he has learned from his numerous credentials extend well beyond the exam content.
At first glance, the topics of cybersecurity and environmental, social and governance (ESG) initiatives seem a bit distant from one another. Despite several sources publishing their linkages (e.g., ...
ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber ...
At the ISACA® North America Conference, hundreds of cybersecurity and audit professionals gathered for ISACA's first ...
Join ISACA’s Advanced in AI Risk (AAIR) beta program, the credential for experienced IT risk professionals managing emerging ...
Discover how digital trust professionals can easily earn valuable Continuing Professional Education (CPE) credits through ISACA online courses, webinars, virtual summits and in-person events.
Abstract: Enterprises have long struggled to realize meaningful value from traditional cyberthreat intelligence programs. Common challenges include intelligence that is not actionable, overwhelming ...
An organization that has carefully maintained defenses and clear response protocols is more secure than one with a flashy collection of 'solutions' that lack proper management.
What’s the state of cybersecurity in the coming year? As the cybersecurity threat landscape grows more complex, professionals are under pressure to safeguard their organizations while navigating ...
The Audit Proactivity Maturity Model (APMM) serves as a practical guide for advancing audit proactivity to transform audit into an agent of change.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results