ISACA Journal: A Quantum Leap , Vol. 4, 2022
DEPARTMENTS
1. Letter From the Incoming Board Chair. --PAMELA NIGRO, CISA, CGEIT, CRISC, CDPSE, CRMA
2. Information Security Matters: Cyber Decisions Only Executives Can Make. --STEVEN J. ROSS, CISA, CDPSE, AFBCI, MBCP
3. IS Audit in Practice: Implementing Emerging Technologies: Agile SDLC Still Works. --CINDY BAXTER, CISA, ITIL FOUNDATION
4. Innovation Governance: Charting the Course for Quantum Computing. --K. BRIAN KELLE Y, CISA, CDPSE, CSPO, MCSE, SECURITY+
FEATURES
1. Focal Points for Auditable and Explainable AI (DISPONIBLE ÉGALEMENT EN FRANÇAISS ). --GUY PEARCE, CGEIT, CDPSE
2. Making and Breaking Data Security With Quantum Machines (DISPONIBLE ÉGALEMENT EN FRANÇAISS ). --DALIA KHADER, PH.D., CISSP, GSEC, AND HUSNA SIDDIQI
3. Evaluating Ethical Challenges in AI and ML (DISPONIBLE ÉGALEMENT
EN FRANÇAISS ). --JOSHUA SCARPINO, CISM, CISSP
4. Managing Security Across Disparate Database Technologies. --ADAM KOHNKE, CISA, CISSP, GI AC, GPEN
5. Case Study: Eliminating the Embedded Malware Threat at the Binary Level. --MICK BRADY
6. Rethinking the Effectiveness of Controls in the Digital Age (TAMBIÉN DISPONIBLE
EN ESPAÑOL). --JEIMY J. CANO M., PH.D., ED.D., CFE, CICA
7. Privacy, Security and Bias in Emerging Technologies. --SHINI MENON, CISA,
CISM, CDPSE
8. Implementing Artificial Intelligence: Capabilities and Risk. --IVY MUNOKO, PH.D., CISA, ACCA
PLUS
1. Crossword Puzzle. --MYLES MELLOR
2. CPE Quiz
3. ISACA Bookstore Supplement
1. Letter From the Incoming Board Chair. --PAMELA NIGRO, CISA, CGEIT, CRISC, CDPSE, CRMA
2. Information Security Matters: Cyber Decisions Only Executives Can Make. --STEVEN J. ROSS, CISA, CDPSE, AFBCI, MBCP
3. IS Audit in Practice: Implementing Emerging Technologies: Agile SDLC Still Works. --CINDY BAXTER, CISA, ITIL FOUNDATION
4. Innovation Governance: Charting the Course for Quantum Computing. --K. BRIAN KELLE Y, CISA, CDPSE, CSPO, MCSE, SECURITY+
FEATURES
1. Focal Points for Auditable and Explainable AI (DISPONIBLE ÉGALEMENT EN FRANÇAISS ). --GUY PEARCE, CGEIT, CDPSE
2. Making and Breaking Data Security With Quantum Machines (DISPONIBLE ÉGALEMENT EN FRANÇAISS ). --DALIA KHADER, PH.D., CISSP, GSEC, AND HUSNA SIDDIQI
3. Evaluating Ethical Challenges in AI and ML (DISPONIBLE ÉGALEMENT
EN FRANÇAISS ). --JOSHUA SCARPINO, CISM, CISSP
4. Managing Security Across Disparate Database Technologies. --ADAM KOHNKE, CISA, CISSP, GI AC, GPEN
5. Case Study: Eliminating the Embedded Malware Threat at the Binary Level. --MICK BRADY
6. Rethinking the Effectiveness of Controls in the Digital Age (TAMBIÉN DISPONIBLE
EN ESPAÑOL). --JEIMY J. CANO M., PH.D., ED.D., CFE, CICA
7. Privacy, Security and Bias in Emerging Technologies. --SHINI MENON, CISA,
CISM, CDPSE
8. Implementing Artificial Intelligence: Capabilities and Risk. --IVY MUNOKO, PH.D., CISA, ACCA
PLUS
1. Crossword Puzzle. --MYLES MELLOR
2. CPE Quiz
3. ISACA Bookstore Supplement
Ross, Steven J. - Personal Name
KOHNKE, ADAM - Personal Name
SCARPINO, JOSHUA - Personal Name
KHADER, DALIA - Personal Name
NIGRO, PAMELA - Personal Name
Jeimy J. Cano M. - Personal Name
Menon, Shini - Personal Name
Brady, Mick - Personal Name
Pearce, Guy - Personal Name
Kelley, K. Brian - Personal Name
Baxter, Cindy - Personal Name
Mellor, Myles - Personal Name
MUNOKO, IVY - Personal Name
KOHNKE, ADAM - Personal Name
SCARPINO, JOSHUA - Personal Name
KHADER, DALIA - Personal Name
NIGRO, PAMELA - Personal Name
Jeimy J. Cano M. - Personal Name
Menon, Shini - Personal Name
Brady, Mick - Personal Name
Pearce, Guy - Personal Name
Kelley, K. Brian - Personal Name
Baxter, Cindy - Personal Name
Mellor, Myles - Personal Name
MUNOKO, IVY - Personal Name
Vol. 4, 2022
1944-1967
e-Journal PTI
Inggris
ISACA
2022
USA
59 hlm
LOADING LIST...
LOADING LIST...