Putting Machine Learning in Perspective
Body: Machine learning is bantered around in the media often these days, many times erroneously. The key question that concerns auditors is not how to build machine learning algorithms or how to debate...
View ArticleUpdating the COBIT Process Assessment Model
Body: Determining the level of process maturity for a given set of IT-related processes allows organizations to determine which processes are essentially under control and which represent potential...
View ArticleBig Data in Organizations
Body: Big data is a huge volume of data that cannot be treated by traditional data-handling techniques because it is mostly unstructured and complex. Thus, proper collation, coordination and harnessing...
View ArticleWorking With Big Data
Body: The institutions we all serve are inevitably going to utilize big data, if not now, soon. This is because of the power of extracting value from big data for the benefit of the products we make...
View ArticleLeveraging Artificial Intelligence
Body: ISACA has provided guidance on the definition and use of threat intelligence and the sources of threat intelligence. These sources range from ISACA feeds, consulting firms, open source threat...
View ArticleDeveloping a DLP Program
Body: We live in an age where a tremendous amount of information is shared freely on the Internet, and, in many cases, with little regard for the consequences. In some cases, we do not even recognize...
View ArticleCryptographically Protecting Databases Against Data Breaches
Body: Information security professionals should start considering cryptographic approaches to protect enterprise data and mitigate database breaches. System security in layers provides an approach for...
View ArticleFirst Steps for Automating Your IOC Provision Sources
Body: The first step is always the hardest. If your organization lacks adequate cybersecurity intelligence processes and you are looking for a quick win solution, we are here to assist. We have...
View ArticleHow to Prioritize Security Controls Implementation
Body: When developing an information security architecture framework in a new organization, there are a few steps that normally have to be taken to identify the business requirements, the right...
View ArticleInnovating Innovation Governance
Body: Almost every enterprise aspires to use technology for integrating information, achieving process efficiencies and transforming service delivery into a paragon of effectiveness. Organizational...
View ArticleHow, Not What
Body: During my time as an IT auditor, I have been privileged to attend many excellent and inspiring presentations at ISACA Ireland conferences and seminars, ISACA webinars and, of course, EuroCACS....
View ArticleWorking With Access Certification Data
Body: I want to take this opportunity to dive a little more into the metrics that come out of an access certification program. One of the greatest joys in life is when you have enough data that you can...
View ArticleIT Innovation Governance: From International Policy to Company Oversight
Body: “Governance” and “innovation” are terms of such global importance today that an innovation governance event billed as “the first global leadership roundtable centered on issues at the...
View ArticlePerforming Cyberinsurance “CPR”
Body: Cyberinsurance and data privacy will garner more focus for the remainder of 2018 and beyond. The impending “Equifax effect,” which most of us anticipated, was put forth in late February 2018 by...
View ArticleSecurity of Currencies
Body: Recently, the world has seen more leaders win elections based on promises to fight against corruption in their countries . This shows how eager people are to weed out corruption, terror funding,...
View ArticleHow Blockchain Technology Will Revolutionize the Global Workforce and...
Body: By 2020, about 40% of the US workforce will be temporary workers. The median tenure of workers age 25 to 34 is 2.8 years. The average working American changes their job 10 to 15 times during the...
View ArticleLeveraging SOC Use Cases
Body: The majority of modern organizations have embarked on the path security operations centers (SOCs) are building. Today, the SOC is not a modern trend; it is a forced restructuring and reorganizing...
View ArticleEstablishing a Triumvirate—Understanding the Interests for Enhancing...
Body: In one of my recently published ISACA Journal articles, “Clash of the Titans: How to Win the ‘Battle’ Between Information Security and IT Without Losing Anyone,” I pointed out some of the...
View ArticleUnderstanding the Threat Landscape
Body: Privacy and security are issues society struggles with on a daily basis, both in our private lives and in our work. We all strive to be happy, and safety is an important but an uncertain factor...
View ArticleFormalizing the Cybersecurity Role in MDM
Body: While some cybersecurity teams may be anxious to get involved with master data management (MDM), there are prerequisites that we strongly recommend be in place prior to starting down the...
View Article
More Pages to Explore .....