All Episodes

Displaying 91 - 105 of 105 in total

Episode 91: Evaluating IT Resource and Project Management Alignment

To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through...

Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards

Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for I...

Episode 93: Evaluating IT Key Performance and Risk Indicators

Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monito...

Episode 94: Evaluating IT Vendor Selection and Contract Management

Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you...

Episode 95: Evaluating Supply Chain Risk and Integrity Issues

Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersec...

Episode 96: Evaluating End-User Support Processes

Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution,...

Episode 97: Evaluating Enterprise Architecture Alignment

Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, gover...

Episode 98: Evaluating IT Operations and Maintenance Practices

Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenan...

Episode 99: Evaluating Data Governance Program

Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle c...

Episode 100: Evaluating Privacy and Data Classification Programs

Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classificatio...

Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management

IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage...

Episode 102: Evaluating Shadow IT Risks and Controls

Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-b...

Episode 103: Evaluating Threat and Vulnerability Management

Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability asse...

Episode 104: Providing Guidance on Information Systems Quality Improvement

Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement pro...

Episode 105: Evaluating Risks of Emerging Technologies and Practices

Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blo...

Broadcast by