
SheLeadsTech Fireside Chat: Celebrating Women in Cybersecurity
Women in cybersecurity leaders share their stories and career advice in this SheLeadsTech fireside chat celebrating International Women’s Da...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beg...

Women in cybersecurity leaders share their stories and career advice in this SheLeadsTech fireside chat celebrating International Women’s Da...

On this episode of the ISACA Podcast, host Chris McGowan is joined by Amit Patel, Senior Vice President at Consulting Solutions, to explore...

You’re listening to Secure Your Privates™ brought to you by ISACA Podcasts - where security meets privacy, risk meets reality, and governanc...

In this ISACA Podcast episode, host Safia Kazi, Principal Research Analyst – Privacy, is joined by Dirk Schrader, VP of Security Research at...

Lauren Hasson is the Founder of DevelopHer, an award-winning career development platform. In this podcast, she'll share a bit about her back...

In this episode, ISACA's Lisa Cook engages with Yakir Golan, Executive Officer (CEO) and Co-Founder of Kovrr, to explore the critical role o...

Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide. In this episode of the ISACA Podcast, ho...

Cybersecurity and the role of internal audit, an urgent call to action: The forces driving business growth and efficiency contribute to a br...

The prevalence of ransomware and the security concerns associated with AI have made the role of cybersecurity professionals vital for enterp...

Given the dynamic nature of cyberthreats and the ever-expanding digital ecosystem, authentication is more critical than ever. In this episod...

Emerging healthcare technologies have the potential to revolutionize healthcare and accessibility-related concerns, but these advancements a...

SAP systems are treated differently than many other enterprise applications from a cybersecurity perspective. Most SAP security teams are si...

Many people are pondering whether generative artificial intelligence (AI) tool ChatGPT is a friend or a foe. In this ISACA podcast episode,...

Welcome to Episode 4 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves...

Welcome to Episode 3 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves...

Traditional security questionnaires just aren't cutting it anymore. Tune into this ISACA Podcast episode, Chris McGowan chats with VISO TRUS...

Are you curious about how to maximize the strategic value and impact of your bug bounty program? In this episode, you can learn how Adobe co...

Welcome to Episode 2 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves...

Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!” Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA...

Getting dressed is a routine example of everyday life packed with choices. Should I wear pants or shorts? Do I need a sweater? Shoes or sand...

ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security Matters column. Over the last quarter century,...

Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability...

In this ISACA Podcast episode, we’ll delve into how leveraging Agile concepts can mitigate common challenges neurodiverse auditors face in t...

With the increasing demand for audits and risk assessments, artifact requests will not be going away anytime soon. However, the burden these...

Effective IT issue management is crucial for organizations to mitigate financial loss, reputational damage, and operational disruptions. Iss...

Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain security compliance certifications that demonst...

Understanding product security risk starts before a single code line is written. Teams can discover threats to the architecture of a system...

Security risks introduced by vendors have become a top-of-mind concern for executives today, driven by recent supply chain incidents that ha...

If we want people to bring their most creative, innovative selves to work, we need to cultivate a culture where inspiration is given, encour...

Neurodiversity within cybersecurity offers many benefits but requires organizations and hiring managers to re-evaluate hiring practices and...

Agile Scrum is a lightweight framework that promises to significantly improve internal audits by creating a mindset that generates stakehold...

Chronic workplace stress can lead to burnout, which poses a significant risk to the mental health of busy professionals, such as auditors. B...

While users of technology are becoming more educated in how to avoid cyberattacks such as phishing, a distracted user might be more prone to...

A comprehensive information security awareness program must be in place to ensure that employees are aware of and educated about the threats...

This podcast speaks about how an Information Systems (IS) Auditor can prepare for the Interruptions, Disruptions and the Emergence events th...

On this podcast, ISACA's Hollee Mangrum-Willis and special guest Cindy Baxter discuss the disparities between American communities and acces...

ISACA Digital Trust Advisory Council Members Anne Toth and Michelle Finneran Dennedy will discuss privacy concerns and priorities around eme...

Scott Gould is the author of 'The Shape of Engagement: The Simple Process Behind how Engagement Works.' In this podcast, Scott gives a sneak...

In security, aligning with product teams has never been more important, especially when outmaneuvering adversaries. To foster a truly produc...

We, as a society, have always lived by certain norms that are driven by our communities. These norms are enforced by rules and regulations,...

Organizations today struggle with vulnerability management. More specifically, remediating vulnerabilities in a timely manner poses a challe...

Guests Jack Freund and Natalie Jorion discuss the need for additional data for quantitative risk analyses and methods to derive that data wh...

Are you wondering about the ever-changing landscape of IT compliance and risk management? Look no further. Hyperproof, a leading SaaS compli...

The world of business has changed dramatically over the past few years. Our digital world is more connected than ever, leaving security and...

Cyber threats are now a “clear and present danger” to most organizations, companies and governments of the world. A good cyber defense invol...

Conducting adequate preparation including risk assessments, assessing resource requirements and ensuring ongoing communication to harness bo...

This podcast is a practical discussion with two IT Internal Auditors, Frans Geldenhuys and Gustav Silvo, that have automated IT General Cont...

Organizational culture is crucial because it shapes behaviors and attitudes in the workplace, which can profoundly impact operations and ove...

What are the primary risks associated with the adoption of emerging technologies, particularly during periods of high market volatility and...

Get to know Chief Membership and Marketing Officer Julia Kanouse as she sits down with childhood best friend and ISACA VP Amanda Raible. The...