All Episodes

Displaying 101 - 106 of 106 in total

Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management

IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage...

Episode 102: Evaluating Shadow IT Risks and Controls

Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-b...

Episode 103: Evaluating Threat and Vulnerability Management

Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability asse...

Episode 104: Providing Guidance on Information Systems Quality Improvement

Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement pro...

Episode 105: Evaluating Risks of Emerging Technologies and Practices

Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blo...

Welcome to the ISACA CISA Certification

Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this ...

Broadcast by