All Episodes
Displaying 101 - 106 of 106 in total
Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management
IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage...
Episode 102: Evaluating Shadow IT Risks and Controls
Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-b...
Episode 103: Evaluating Threat and Vulnerability Management
Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability asse...
Episode 104: Providing Guidance on Information Systems Quality Improvement
Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement pro...
Episode 105: Evaluating Risks of Emerging Technologies and Practices
Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blo...
Welcome to the ISACA CISA Certification
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this ...