100 episodes

The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. The experts interviewed in the ISACA Podcast have valuable perspectives they have gained from their years of experience in the field. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

ISACA Podcast ISACA Podcast

    • Technology
    • 4.4 • 34 Ratings

The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. The experts interviewed in the ISACA Podcast have valuable perspectives they have gained from their years of experience in the field. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.

    Unlocking Strategic Value from a Bug Bounty Program

    Unlocking Strategic Value from a Bug Bounty Program

    Are you curious about how to maximize the strategic value and impact of your bug bounty program?
    In this episode, you can learn how Adobe continuously develops and improves its bounty program to engage security researchers and hackers globally and improve its security posture from an adversary perspective.
    In this ISACA Podcast, Chris McGown, ISACA's Information Security Professional Practices Principal, chats with Alex Stan, Product Security Engineer and member of the Product Security Incident Response Team (PSIRT), discusses the value of bug bounty programs and shares how you can develop a metrics-driven approach to enhance the internal security testing and detection capabilities of your organization.
    Explore Further: Delve deeper into the subject with additional resources
    https://blog.developer.adobe.com/adobe-announces-researcher-hall-of-fame-initiative-for-security-researchers-5e677286dbd6
    https://blog.developer.adobe.com/researcher-q-a-aem-solution-architect-by-day-adobe-bug-bounty-hunter-by-night-aed39a4750e4
    https://blog.developer.adobe.com/attention-security-researchers-level-up-your-skills-and-join-our-private-bug-bounty-program-2da9d5979d8b
    https://blog.developer.adobe.com/adobe-recap-2023-ambassador-world-cup-final-four-df701e1a1b12

    • 27 min
    The Cyber Standard Podcast - Episode 1

    The Cyber Standard Podcast - Episode 1

    Tune in to the inaugural episode of "The Cyber Standard Podcast," “The Vision!”
    Join host Ameet Jugnauth as he interviews Robin Lyons, ISACA Principal, IT Audit Professional Practices, and Annmarie Dann, Director of Professional Standards at the UK Cyber Security Council, in a compelling discussion about the standardization of specialisms in cybersecurity. Explore the Council's and ISACA's visions for the future, the significance of the Audit & Assurance specialism, and the collaborative efforts between the two organizations. Don't miss this insightful conversation that sets the stage for the podcast's journey into the world of cybersecurity standardization.
    Explore Further: Delve deeper into the subject with additional resources provided in the episode description.
    https://www.isaca.org/about-us/newsroom/press-releases/2023/uk-cyber-security-council-partners-with-isaca-for-audit-and-assurance-pilot-scheme 

    • 41 min
    Measuring Security Risk Against Dynamic Threats

    Measuring Security Risk Against Dynamic Threats

    Getting dressed is a routine example of everyday life packed with choices. Should I wear pants or shorts? Do I need a sweater? Shoes or sandals? While we often make these choices subconsciously, even actions that don’t appear as choices include several microscopic risk-based calculations. These judgments are executed based on some estimate of risk, and as known in the cybersecurity industry, what is believed to be safe today may no longer be safe tomorrow (or possibly even within the hour). Given this unique challenge, how do you establish a process that allows you to identify, analyze, prioritize, and treat security risks that are constantly evolving and where the threat is persistently adapting?In this podcast, ISACA's Lisa Cook discusses with Adobe's Matt Carroll, Senior Manager of Technology Governance, Risk, and Compliance the risk methodology and practices his team has developed at Adobe that have helped the company rapidly measure security risk in a constantly changing landscape.

    • 28 min
    Reflecting on 25 Years of Information Security Matters

    Reflecting on 25 Years of Information Security Matters

    ISACA recently marked the 25th anniversary of Steve Ross’ ISACA Journal Information Security Matters column. Over the last quarter century, technology, security, and the workforce have evolved, while certain challenges remain the same.
    In this ISACA Podcast episode, Safia Kazi speaks to Steve about how he started writing for the Journal, societal shifts in security perceptions, and how writing skills are invaluable for anyone in the security industry.

    • 13 min
    A View into CTEM Exposure Management: Reducing your Attack Surface 3x

    A View into CTEM Exposure Management: Reducing your Attack Surface 3x

    Organizations can no longer rely on legacy vulnerability management solutions to protect against even basic attacks. Instead, vulnerability management is just one small component in a unified continuous threat exposure management (CTEM) approach to securing an enterprise from malicious intruders and ransomware. In addition to vulnerability management, security around misconfigurations, patching, identity, software, external attack surfaces, and more must be included.
    In this ISACA Podcast, Nanitor Chief Strategist Derek Melber explains that an organization can prevent breaches and ransomware by taking an asset-centric prioritized-security approach that includes all of these security areas.
    For more ISACA Podcasts, visit www.isaca.org/podcasts
    To learn more about Nanitor, please visit https://nanitor.com/
    To view the Nanitor article, please click https://nanitor.com/resources/blog/cybersecurity/exploring-continuous-threat-exposure-management-ctem/

    • 43 min
    Improving Security while Enabling Market Access with CCF

    Improving Security while Enabling Market Access with CCF

    Software-as-a-Service (SaaS) providers continue to face increasing customer demand to attain security compliance certifications that demonstrate commitment to security, privacy, confidentiality, and more. Pursuing every national and international certification individually results in a repetitive cycle of ongoing walkthroughs, interviews, testing, and evidence requests (i.e., audits).
    A central CCF can be considered a one-stop shop response to the complex alphabet soup of compliance standards on the market today.
    In this ISACA Podcast episode, ISACA's Chris McGowan listens in as Zach Folk, Director of Solutions Engineering explains why having a central CCF can help various product engineering teams meet their security compliance needs and understand the level of effort required for each compliance certification.

    • 21 min

Customer Reviews

4.4 out of 5
34 Ratings

34 Ratings

AllTimeListener ,

Please add more podcasts

I really enjoy listening to the ISACA podcasts. I can get through a lot of these on my commute to work. Definitely more convenient than the journals and online articles.

Hawkdriver1974 ,

Good topics, 2d rate audio quality

The topics and discussions can be very engaging, but I'm distracted by the poor audio quality. I strain to hear the hosts because they sound like they're in an empty warehouse, and the guest audio quality often isn't any better. Invest in higher quality microphones and use rooms with less echo and they'd have a more professional sounding podcast.

obacker19 ,

Empowering, insightful and actionable! 🙌

Whether you’re well established as someone innovating in the cybersecurity world, or just getting started as a catalyst for change - this is a must-listen podcast for you! Abby and the entire ISACA team do an incredible job bringing together insightful conversations that cover a huge breadth of topics related to the ins and outs of successfully navigating an ever changing regulatory landscape - with leaders who are actually in the field themselves. Highly recommend listening and subscribing!

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Dwarkesh Podcast
Dwarkesh Patel
TED Radio Hour
NPR
The Neuron: AI Explained
The Neuron

You Might Also Like

CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
Cyber Security Headlines
CISO Series
Defense in Depth
David Spark
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Cybersecurity Today
ITWC
CyberWire Daily
N2K Networks