News
What happens if weaknesses in an organization's monitoring and detection capabilities cloud visibility so severely that it ...
The convergence of information technology (IT) and operational technology (OT) is rapidly changing the industrial landscape ...
Two of the most significant challenges in remote auditing are enabling key relationships and accessing information. But ...
The evolution of technology has transformed human–machine relationships, resulting in an unprecedented computing environment for physical systems with digital components. The paradigm of ...
Can organizations balance harnessing the value of data with protecting consumer privacy? What is the balance between the ...
Urgent training needs Top AI risks Workforce readiness Year-over-year trends ...
CMMI Tech Talk: Organizational Training (OT) Practice Area Overview. Review of the Organizational Training (OT) Practice Area. We will discuss the intent of this Practice Area and look at what value ...
Listen in as ISACA Journal columnist, Steven Ross, CISA, CDPSE, AFBCI, CISSP, MBCP, delves deeper into his latest article, “Advanced Security for Secret Information.” ...
CMMI Tech Talk: Organizational Training (OT) Practice Area Overview. Review of the Organizational Training (OT) Practice Area. We will discuss the intent of this Practice Area and look at what value ...
Visit the CommunITy Day page on Engage to find an opportunity, either in-person or virtually, with your chapter or with our global community. It’s an incredible experience, and we hope you’ll join us ...
This is intended to be a 2-part CMMI Tech Talk on CMMI Practice Area Managing Security Threats and Vulnerabilities (MST). Related Tech Talk- CMMI Tech Talk: CMMI Model Deep Dive: Managing Security ...
How Do Organizations Control Their Use of Social Media Part IV - What are the main risks that most enterprises need to consider when it comes to social media? If you don’t know, you and your ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results