CSA Industry Blog Listed Among 100 Top Information Security Blogs for Data Security

CSA Industry Blog Listed Among 100 Top Information Security Blogs for Data Security

Our blog was recently ranked 35th among 100 top information security blogs for data security professionals by Feedspot. Among the other blogs named to the list were The Hacker News, Krebs on Security and Dark Reading. Needless to say, we’re honored to be in such good company. To be listed, Feedspot’s editorial team and expert reviews, assessed [...]

Talking Team-Building, Business Continuity and Risk Management with Vicki Gavin

Talking Team-Building, Business Continuity and Risk Management with Vicki Gavin

Editor’s note: Vicki Gavin, CRISC, MBCI, is compliance director, and head of business continuity, cyber security and data privacy for The Economist. Gavin, based in London, recently visited with ISACA Now to discuss how her areas of expertise are being affected by the fast-changing technology and regulatory landscape. The following is an edited transcript. ISACA Now: [...]

Use Multiple Guidance Systems for Effective Governance

Use Multiple Guidance Systems for Effective Governance

In today’s competitive environment, enterprises are under enormous pressure to focus valuable resources on initiatives that provide value. The inherent issue with most approaches is that the methods used to determine organizational priorities are often flawed by focusing on compliance as a primary navigation aid. A “compliance only” focused program can have a huge effect [...]

Job Boards, Social Networking Sites Can Set Cyber Attacks in Motion

Job Boards, Social Networking Sites Can Set Cyber Attacks in Motion

One of the most common cyber security questions I get is: How do attackers plan/carry out their attacks? I thought this would be a great topic to address since we are always asked to explain the risk of any audit observation we make. So, what is risk anyway? In a cyber security context, think of [...]