Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Company Directory
ISACA
3701 Algonquin Road
Suite 1010
Rolling Meadows
IL 60008
USA
[t] +1 847 253 1545
[f] +1 847 253 1443
Guide available for Sarbanes-Oxley IT control objectives
08 December, 2014
ISACA is providing its membership with a free guide to enable them to understand the IT control objectives of the Sarbanes-Oxley regulations
Preparations for increase in IT security complexity in 2014
24 December, 2013
ISACA releases its views of the changing world of IT security during 2014 with its list of five New Year resolutions
Free ISACA white paper examines Security as a Service
05 December, 2013
IT security industry body releases white paper detailing which questions should be posed before considering the deployment of cloud based security as a service
Location based marketing seen as intrusive
26 November, 2013
Survey of consumers by ISACA reveals attitudes towards location based marketing on mobile phones and unwanted discount coupons
Information Governance in big data environments
15 November, 2013
The move towards complexity in data storage and compliance needs are demanding greater focus on information governance
Book on APTs provides protection advice
14 October, 2013
ISACA has published a book on Advanced Persistent Threats: How to manage risk to your business, detailing how modern defences are required against such threats
IS Audit and Assurance Guideline feedback sought
02 October, 2013
ISACA is soliciting feedback on updates it has made to its set of IS audit and assurance guideline drafts
Cybersecurity features in free ISACA conference
04 April, 2013
ISACA is hosting a free online conference on the state of cybersecurity to provide practical guidance on threat protection
ISACA event to focus on business technology integration
25 March, 2013
The Insights 2013 conference run by ISACA will take place in Berlin during June to examine the integration of technology and business
Virtual conference addresses cloud data security
11 March, 2013
ISACA has organised an all-day online conference to address the main issues surrounding data security in cloud computing environments
APT threats affecting 20% of enterprises
15 February, 2013
Survey from ISACA reveals the extent of penetration of Advanced Persistent Threat (APT) attacks on global enterprises
Assessment programme examines business goals
31 January, 2013
ISACA is equipping IT professionals with tools to match IT requirements to general business goals with the COBIT 5 Assessment programme
New job demands catered for in IT security qualification
29 January, 2013
ISACA has performed job analysis to modify CGEIT certificate to reflect changes in the roles of IT security professional
ISACA identifies key IT trends of 2013
20 December, 2012
Looking to the year ahead, ISACA identifies certain aspects of IT security that will have the greatest impact on organizations
BYOD highlighted in risk/reward barometer
14 December, 2012
IT Security organisation publishes results from risk vs reward barometer focusing on the blurring of IT perimeters and the BYOD phenomenon
Training partnership for COBIT 5
03 December, 2012
ISACA enters partnership for providing training to IT security professionals in the COBIT 5 framework for government and enterprise IT management
ISACA investigates online privacy threat to the workplace
14 November, 2012
With online shoppers more active at this time of year, ISACA discovers the level of risk taken by workers with their online privacy
IT security audit materials available from ISACA
13 November, 2012
IT professional body releases additional security audit plans in its range for security personnel to use for cybercrime, biometric, e-commerce and VPN security audits
IS Audit and Assurance Standards open for comment
24 October, 2012
ISACA is encouraging visitors to its website to comment on the latest version of the organization's IS Audit and Assurance Standards
Ten Reasons Why Confidence In Cloud Computing Is Stagnating
01 October, 2012
Study from ISACA and the Cloud Security Alliance shows the main reasons why poor confidence exists in the cloud impeding adoption
ISACA Speculates On the Next Trend Beyond BYOD
10 September, 2012
Christos Dimitriadis of ISACA looks into the background of BYOD (Bring Your Own Device) and uses it to foretell the future of network security and predict what will BYOD V2 be
ISACA Changes Rules On CGEIT Certification
03 September, 2012
After the end of this year, Governance of Enterprise IT certification from ISACA will no longer be based on current job practice
The Role of Governance in Identity and Access Management
30 August, 2012
Mike Small of ISACA explains the approach of good governance in its role as a binding factor in controlling access and managing identity
Cloud Computing And The Dangers Of A Slothful Approach
29 August, 2012
Being sluggish in comprehending the cloud computing environment that a business is adopting can lead to problems as explained by Mike Small of ISACA
Information Security Governance Explored in Munich Conference
23 August, 2012
ISACA is hosting a conference in Munich examining Information security governance and risk management in September
Partnership Results In New COBIT 5 Courses
21 August, 2012
ISACA is launching four new courses in COBIT 5 for Enterprise IT and Governance alongside APMG for IT Security professionals
Three Key Lessons of IT Risk Management
13 August, 2012
Brian Barnier of ISACA details three key lessons for the prevention of IT security incidents in the enterprise
ISACA Looks At Hidden Costs of Migrating to the Cloud
06 August, 2012
A new white paper from ISACA examines cloud migration and details five hidden costs associated with it
ISACA Comments On Inclusion of Software Testing in Governance
17 July, 2012
Information Security Professional Organisation considers the inclusion of software testing under the umbrella of security governance to be a move in the correct direction
Combined EuroCACS and ISRM Conference in Munich
12 July, 2012
ISACA is combining the EuroCACS and ISRM conferences in one event this year to take place in September in the German city of Munich
Virtual Conference Explores BYOD
10 July, 2012
ISACA is presenting a virtual conference with CPE accreditation for IT security professionals on the challenges of mobile security in the context of BYOD
ISACA Explains Enterprise Log Management
06 July, 2012
Experts from ISACA introduce the concept of Enterprise Log Management and how it is used
AET Protection Expertise From ISACA
05 July, 2012
IT Security professional industry body provides information on protection against Advanced Evasion Techniques
ISACA Certifications Are Amongst Highest Paying Qualifications
19 June, 2012
IT Security Professionals with ISACA qualifications amongst the highest rewarded, according to an IT Skills Pay Index
VDI Guidance Available From ISACA
25 May, 2012
IT Security professional certification body issues free guidance on virtualized desktop infrastructure
Growth In IT Security Professional Certification
21 May, 2012
ISACA has noted the increase in IT professionals seeking security certification with the 5000th CGEIT certificate awarded
Enterprise IT Governance Framework
11 April, 2012
Cyber Risk Mitigation Virtual Conference
16 March, 2012
Free virtual conference carries CPE credits for ISACA members and covers risk mitigation strategies
ISACA Chapter Created In Venice
20 February, 2012
Support will be provided for information security professionals in Italy through the new chapter of ISACA formed in the city of Venice
Audit and Assurance Programs For Risk Managers
03 February, 2012
ISACA has developed a range of services covering auditing and assurance to provide assistance to IT assurance professionals
Management Of Growing IT Security Trends in 2012
05 January, 2012
ISACA examines the trends in 2012 for Big Data, IT Consumerisation and the growth in mobile technology with recommendations on their management
Steps Towards Preventing Cyber Espionage
30 November, 2011
Speaking to ISACA, Michael Podszywalow details the steps to be taking for the detection and prevention of corporate cyber espionage
Social Network Attack Strategies Explained
01 November, 2011
Aditya Sood and Richard Enbody of ISACA explain the phenomenon of social network and the way it is being exploited by malware writers
Guide To Security Vulnerabilities For Web Applications
26 October, 2011
ISACA has published a guide that details the vulnerabilities and strategies required to overcome them for web applications
Whitepaper Examines Smartphone Geolocation Risks
29 September, 2011
In its white paper Geolocation Risk, Issues and Strategies, ISACA offers smartphone users a five step plan to avoiding risks associated with the use of geolocation applications
Report Indicates Higher Salaries For ISACA Certified Professionals
15 September, 2011
IT Security professionals with certification from ISACA can expect to earn higher salaries according to report from IT research firm
Security Considerations On Adopting Cloud Computing
12 September, 2011
The ISACA Security Advisory Group explains how risk management should be applied when adopting a cloud computing strategy
Reconciling Privacy, Identity and Trust in Cloud Computing
03 August, 2011
Mike Small of ISACA examines how the concept of privacy is being redefined on the internet and how this can be reconciled with identity and trust
Privacy And Information Governance Lessons From News Of The World Hack Affair
01 August, 2011
Mike Small of the ISACA Security Advisory Group examines the legacy of the News of The World in terms of Information Governance and Privacy
Guide Available For Cloud Computing Governance
29 July, 2011
Enhancing value and managing risk in cloud computing implementations is the aim of a new guide available from ISACA on cloud governance
First | Prev  | 1 | 2 | 3  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo