All Episodes
Displaying 91 - 105 of 105 in total
Episode 91: Evaluating IT Resource and Project Management Alignment
To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through...

Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards
Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for I...

Episode 93: Evaluating IT Key Performance and Risk Indicators
Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monito...

Episode 94: Evaluating IT Vendor Selection and Contract Management
Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you...

Episode 95: Evaluating Supply Chain Risk and Integrity Issues
Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersec...

Episode 96: Evaluating End-User Support Processes
Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution,...

Episode 97: Evaluating Enterprise Architecture Alignment
Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, gover...

Episode 98: Evaluating IT Operations and Maintenance Practices
Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenan...

Episode 99: Evaluating Data Governance Program
Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle c...

Episode 100: Evaluating Privacy and Data Classification Programs
Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classificatio...

Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management
IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage...

Episode 102: Evaluating Shadow IT Risks and Controls
Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-b...

Episode 103: Evaluating Threat and Vulnerability Management
Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability asse...

Episode 104: Providing Guidance on Information Systems Quality Improvement
Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement pro...

Episode 105: Evaluating Risks of Emerging Technologies and Practices
Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blo...
