In an increasingly interconnected world, robust cybersecurity is paramount, and at its core lies effective authentication. As ...
Jorge Carrillo, who has earned more ISACA certifications than anyone in the world, says the lessons he has learned from his numerous credentials extend well beyond the exam content.
See answers to frequently asked questions about the new ISACA Advanced in AI Risk (AAIR) certification, designed to equip professionals to excel as artificial intelligence changes the risk landscape.
ROI Example: AI Implementation in a Retail Chain A large retail chain implements an AI-driven inventory management system to optimize its supply chain. The system uses algorithms to predict stock ...
Author: Mary Carmichael, CRISC, CISA, CPA, Member of ISACA Emerging Trends Working Group ...
With times of economic uncertainty on the horizon, ongoing talk of the ever-present skills gap and layoffs across many industries, cybersecurity professionals are wondering what to expect in the ...
In the 1980s, the US Air Force coined the term "cybersecurity" to describe the protection of computer networks. The term was first used in a public forum in 1985, when the Air Force published a paper ...
As enterprises grow larger and become more reliant on external vendors, it becomes necessary to establish effective vendor management programs. Vendor management is a fundamentally critical function ...
To produce risk assessments with more accuracy, artificial intelligence (AI) can be used because one of its core competencies is data aggregation and interpretation.
View the exclusive survey infographic now to uncover the key takeaways and see where your organization stands in the quantum race. Explore ISACA's quantum roadmap revealing key steps to take to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results