All Episodes

Displaying 31 - 60 of 105 in total

Episode 31: IT Resource Management

Resource management is foundational to IT governance, and the CISA exam tests your ability to evaluate how organizations allocate, monitor, and optimize people, hardwa...

Episode 32: IT Vendor Management

Managing third-party risk is a key topic on the CISA exam, and this episode dives into how to audit vendor selection, onboarding, performance evaluation, and contract ...

Episode 33: IT Performance Monitoring and Reporting

Audit success depends on knowing how to evaluate IT performance. This episode explains how key performance indicators (KPIs) and reports are used to measure service de...

Episode 34: Quality Assurance and Quality Management of IT

The CISA exam expects candidates to understand how IT quality is planned, implemented, and improved over time. This episode covers quality assurance policies, continuo...

Episode 35: Overview of Domain 3 – Information Systems Acquisition, Development & Implementation

Domain 3 focuses on the controls and governance involved in acquiring and implementing IT solutions. This episode provides a strategic overview of project governance, ...

Episode 36: Project Governance and Management

Project governance ensures IT initiatives deliver value and align with business goals. This episode covers how auditors evaluate project oversight, milestone tracking,...

Episode 37: Business Case and Feasibility Analysis

Before a project begins, auditors must evaluate whether it’s justified. This episode focuses on auditing business case development, feasibility assessments, and benefi...

Episode 38: Waterfall and Traditional SDLC

Understanding the traditional software development lifecycle is essential for CISA candidates. This episode explains each phase of the waterfall model and the correspo...

Episode 39: Agile, DevOps, and Modern SDLC Approaches

Agile and DevOps are increasingly popular in IT development, and the CISA exam expects you to understand how to audit these environments. This episode explains how con...

Episode 40: Control Identification and Design

Strong control design starts early in the system lifecycle. In this episode, you'll learn how auditors assess whether appropriate controls have been identified and des...

Episode 41: System Readiness and Implementation Testing

Before a new system goes live, auditors must confirm that it’s ready for production. This episode explains how to evaluate readiness through testing, validation, and s...

Episode 42: Implementation Configuration and Release Management

Poor configuration control can lead to outages, vulnerabilities, and audit findings. In this episode, we cover how to evaluate release planning, version control, rollb...

Episode 43: System Migration, Infrastructure Deployment, and Data Conversion

CISA candidates must understand the risks and controls involved in moving systems and data. This episode explains how to audit system migrations, infrastructure rollou...

Episode 44: Post-Implementation Review

Once a system is deployed, the work isn’t over—auditors still need to assess whether objectives were achieved. This episode teaches you how to conduct a post-implement...

Episode 45: Overview of Domain 4 – Information Systems Operations & Business Resilience

Domain 4 shifts focus to the reliability and sustainability of IT operations. In this episode, you’ll gain an overview of operational controls, availability, service d...

Episode 46: IT Components

Understanding the elements that make up the IT environment is essential for audit readiness. This episode breaks down how to evaluate the hardware, software, network, ...

Episode 47: IT Asset Management

IT asset management is more than keeping an inventory—it’s about control, accountability, and lifecycle oversight. In this episode, you’ll learn how to audit asset acq...

Episode 48: Job Scheduling and Production Process Automation

This episode covers how auditors evaluate job scheduling systems, batch processing, and automated task workflows. You’ll learn how to assess controls for error handlin...

Episode 49: System Interfaces

When systems talk to each other, auditors must ensure that the communication is controlled and secure. This episode explores interface types (manual and automated), er...

Episode 50: Shadow IT and End-User Computing

Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and...

Episode 51: Systems Availability and Capacity Management

Auditors must verify that IT systems are designed and managed to meet performance demands. This episode explores how to evaluate availability strategies, capacity plan...

Episode 52: Incident Management Best Practices

When things go wrong, incident management ensures that services are restored quickly and effectively. This episode explains how to audit detection procedures, escalati...

Episode 53: Problem Management and Root Cause Analysis

Problem management focuses on eliminating the underlying causes of incidents. In this episode, you will learn how to audit problem detection, investigation, root cause...

Episode 54: Change Management Processes

Effective change management minimizes disruption and maintains control over the IT environment. This episode walks you through change request procedures, approval work...

Episode 55: Configuration and Patch Management Processes

Configuration and patch controls are essential for system stability and security. In this episode, you will learn how to audit configuration baselines, patch deploymen...

Episode 56: Operational Log Management

Logs provide critical evidence for detecting incidents and monitoring system health. This episode explains how to audit log collection, retention, analysis, and alerti...

Episode 57: IT Service Level Management

Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach han...

Episode 58: Database Management Practices

Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures...

Episode 59: Overview of Business Resilience

Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recove...

Episode 60: Conducting a Business Impact Analysis (BIA)

The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of cri...

Broadcast by