PodParley PodParley
ISACA Podcast cover art

All Episodes

ISACA Podcast — 100 episodes

#
Title
1

SheLeadsTech Fireside Chat: Celebrating Women in Cybersecurity

2

Humans Are IT Security’s Weakest Link

3

Secure Your Privacy: A security and privacy podcast: real conversations, real consequences, real solutions?

4

Securing Data in the Age of AI with DSPM: Lessons from a High-Impact ISACA Webinar

5

Elevate Your Career with Lauren Hasson

6

Cyberrisk Quantification: Strengthening Financial Resilience

7

Securing Desktops and Data from Ransomware Attacks

8

Cyberresilience and Cybersecurity

9

Cybersecurity Predictions for 2025

10

Examining Authentication in the Deepfake Era with Dr. Chase Cunningham

11

Safely and Responsibly Using Emerging Health Technology

12

Addressing SAP Security Gaps

13

What Enterprises Need to Know About ChatGPT and Cybersecurity

14

The Cyber Standard Podcast - Episode 4

15

The Cyber Standard Podcast - Episode 3

16

Effective Third Party Risk Management in 2024: AI’s Impact and Future Trends

17

Unlocking Strategic Value from a Bug Bounty Program

18

The Cyber Standard Podcast - Episode 2

19

The Cyber Standard Podcast - Episode 1

20

Measuring Security Risk Against Dynamic Threats

21

Reflecting on 25 Years of Information Security Matters

22

A View into CTEM Exposure Management: Reducing your Attack Surface 3x

23

Leveraging Agile Concepts for Neurodiverse Auditors

24

Minimizing Risk and Audit Requests

25

Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management

26

Improving Security while Enabling Market Access with CCF

27

Scaling Your Threat Modeling Program

28

Secure your Supply Chain with an Effective Vendor Security Program

29

Cultivating Inspired Leaders with Kristi Hedges

30

Exploring the Benefits of Neurodiversity within Cybersecurity

31

Internal Audits That Create Stakeholder Value Adopting an Agile Mindset

32

Strategies for Avoiding Burnout

33

The Danger of Distraction in Augmented Reality

34

Managing Human Risk Requires More Than Just Awareness Training

35

Preparing for Interruptions, Disruptions and Emergence Events

36

IS Audit in Practice: Data Integrity On Demand

37

ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech

38

Processes of Engagement with Scott Gould

39

Delivering Security Value to Product Teams Using the Power of Data

40

AI Ethics and the Role of IT Auditors

41

Using a Risk-Based Approach to Prioritize Vulnerability Remediation

42

The True Cost of a Data Breach

43

2023 IT Compliance and Risk Benchmark Report

44

What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All

45

How Organizations Can Consistently Reduce Cyberrisk

46

Key Considerations for Conducting Remote IT Audits

47

Seven Things to Know Before Automating IT General Control Audits

48

Understanding, Assessing, Aligning and Transforming Organizational Culture

49

Topics in Emerging Technology, Governance and Ethics

50

Industry Spotlight - Julia Kanouse

51

What Is Your IP Address Cybersecurity IQ? The Role of IP Address Data in a Digital World

52

The Future of Technology Risk: 4 Ways to Build Stakeholder Trust in the Technology Risk Imperative

53

Measuring Security Resilience from the Lens of the Adversary Community

54

Risky Business – Jon Brandt

55

Building Digital Trust Through Advocacy

56

Advertising Information Security

57

Rethinking Identity Governance

58

2023: The Year of Risk

59

Improving Cyber Resilience in an Age of Continuous Attacks

60

Advancing Digital Trust Through Audit and Assurance

61

ISACA Live_Critical Infrastructure Security

62

ISACA Live | Risk Scenarios

63

ISACA Live | How to Mature Your Privacy Compliance Program

64

Career Coach Advice: How to Launch Your IT Audit Career

65

ISACA Live | Advancing Digital Trust Through Data Privacy

66

ISACA Live | The Dark Future of Privacy

67

Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation

68

ISACA Live | Advancing Digital Trust Through IT

69

Should Cybersecurity Be Subject to a SOX-Type Regulation?

70

Beware the Traps of Data Governance and Data Management Practice

71

Convergence: Where Next?

72

Do Data Go To Waste

73

Protecting Your Enterprise and Deterring Fraud in a New Risk Era

74

The Circle of Failure: Why the Cyber Security Industry Doesn’t Work

75

Meeting Attackers Where They Are

76

Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK

77

Auditee Buy-In—A Key Component of Effective Audits

78

Breaking Down the ESET T2 2022 Threat Report

79

Enabling Digital Trust through Canada’s Digital Charter

80

It’s About (Down) Time

81

How Social Engineering Bypasses Technical Controls

82

What Makes Risk Assessments So Unpleasant and How to Change That

83

ISACA CyberPros – Naomi Buckwalter

84

Quantifying the Qualitative Risk Assessment

85

Gaining More Actionable Intelligence Using a Smarter Security Data Lake

86

ISACA Industry Spotlight | Ali Pabrai

87

Managing Cybersecurity Risk as Enterprise Risk

88

Implementing Artificial Intelligence: Capabilities and Risk

89

Audit in Practice: Auditing Culture

90

Incident Report & Continuous Control Monitoring

91

Industry Spotlight - Lisa Young

92

Defending Data Smartly

93

Foco de la industria - Arnulfo Espinosa Dominguez Parte II

94

Ethical AI Shifting the Conversation Left

95

Foco de la industria - Arnulfo Espinosa Dominguez Parte I

96

Why (And How to) Dispose of Digital Data

97

Industry Spotlight - Johann Dettweiler Part II

98

Industry Spotlight - Johann Dettweiler Part I

99

Achieving Effective Cloud Risk Management

100

Industry Spotlight - Dr. Blake Curtis Part II