Quantcast
Channel: Practically Speaking Blog: Posts
Browsing all 305 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Putting Machine Learning in Perspective

Body: Machine learning is bantered around in the media often these days, many times erroneously. The key question that concerns auditors is not how to build machine learning algorithms or how to debate...

View Article



Updating the COBIT Process Assessment Model

Body: Determining the level of process maturity for a given set of IT-related processes allows organizations to determine which processes are essentially under control and which represent potential...

View Article

Big Data in Organizations

Body: Big data is a huge volume of data that cannot be treated by traditional data-handling techniques because it is mostly unstructured and complex. Thus, proper collation, coordination and harnessing...

View Article

Working With Big Data

Body: The institutions we all serve are inevitably going to utilize big data, if not now, soon. This is because of the power of extracting value from big data for the benefit of the products we make...

View Article

Leveraging Artificial Intelligence

Body: ISACA has provided guidance on the definition and use of threat intelligence and the sources of threat intelligence. These sources range from ISACA feeds, consulting firms, open source threat...

View Article


Image may be NSFW.
Clik here to view.

Developing a DLP Program

Body: We live in an age where a tremendous amount of information is shared freely on the Internet, and, in many cases, with little regard for the consequences. In some cases, we do not even recognize...

View Article

Cryptographically Protecting Databases Against Data Breaches

Body: Information security professionals should start considering cryptographic approaches to protect enterprise data and mitigate database breaches. System security in layers provides an approach for...

View Article

Image may be NSFW.
Clik here to view.

First Steps for Automating Your IOC Provision Sources

Body: The first step is always the hardest. If your organization lacks adequate cybersecurity intelligence processes and you are looking for a quick win solution, we are here to assist. We have...

View Article


How to Prioritize Security Controls Implementation

Body: When developing an information security architecture framework in a new organization, there are a few steps that normally have to be taken to identify the business requirements, the right...

View Article


Image may be NSFW.
Clik here to view.

Innovating Innovation Governance

Body: Almost every enterprise aspires to use technology for integrating information, achieving process efficiencies and transforming service delivery into a paragon of effectiveness. Organizational...

View Article

Image may be NSFW.
Clik here to view.

How, Not What

Body: During my time as an IT auditor, I have been privileged to attend many excellent and inspiring presentations at ISACA Ireland conferences and seminars, ISACA webinars and, of course, EuroCACS....

View Article

Working With Access Certification Data

Body: I want to take this opportunity to dive a little more into the metrics that come out of an access certification program. One of the greatest joys in life is when you have enough data that you can...

View Article

IT Innovation Governance: From International Policy to Company Oversight

Body: “Governance” and “innovation” are terms of such global importance today that an innovation governance event billed as “the first global leadership roundtable centered on issues at the...

View Article


Image may be NSFW.
Clik here to view.

Performing Cyberinsurance “CPR”

Body: Cyberinsurance and data privacy will garner more focus for the remainder of 2018 and beyond. The impending “Equifax effect,” which most of us anticipated, was put forth in late February 2018 by...

View Article

Image may be NSFW.
Clik here to view.

Security of Currencies

Body: Recently, the world has seen more leaders win elections based on promises to fight against  corruption in their countries . This shows how eager people are to weed out corruption, terror funding,...

View Article


Image may be NSFW.
Clik here to view.

How Blockchain Technology Will Revolutionize the Global Workforce and...

Body: By 2020, about 40% of the US workforce will be temporary workers. The median tenure of workers age 25 to 34 is 2.8 years. The average working American changes their job 10 to 15 times during the...

View Article

Leveraging SOC Use Cases

Body: The majority of modern organizations have embarked on the path security operations centers (SOCs) are building. Today, the SOC is not a modern trend; it is a forced restructuring and reorganizing...

View Article


Image may be NSFW.
Clik here to view.

Establishing a Triumvirate—Understanding the Interests for Enhancing...

Body: In one of my recently published ISACA Journal articles, “Clash of the Titans: How to Win the ‘Battle’ Between Information Security and IT Without Losing Anyone,” I pointed out some of the...

View Article

Understanding the Threat Landscape

Body: Privacy and security are issues society struggles with on a daily basis, both in our private lives and in our work. We all strive to be happy, and safety is an important but an uncertain factor...

View Article

Formalizing the Cybersecurity Role in MDM

Body: While some cybersecurity teams may be anxious to get involved with master data management (MDM), there are prerequisites that we strongly recommend be in place prior to starting down the...

View Article
Browsing all 305 articles
Browse latest View live




Latest Images