ISACA Journal: Building Digital Trust, Vol. 1, 2023
DEPARTMENTS
1. Guest Editorial. --RINKI SETHI, CISA
2. Information Security Matters: Advertising Information Security. --STEVEN J. ROSS, CISA, CDPSE, ABCI, MBCP
3. IS Audit in Practice: Building Digital Trust Through Advocacy. --CINDY BATER, CISA, ITIL OUNDATION
4. The Bleeding Edge: Infrastructure as Code: Digital Trust Enabler?. --ED MOYLE, CISSP
5. The Digital Trust Imperative:Defining, Establishing and Measuring Digital Trust. --K. BRIAN KELLEY, CISA, CDPSE, CSPO, MCSE, SECURITY
FEATURES
1. Reality Check: The Use of Big Data and Predictive Data. --KEVIN M. ALVERO, CISA, CDPSE, CFE
2. Toward Rebuilding Data Trust. --GUY PEARCE, CGEIT, CDPSE
3. How to Digitally Verify Human Identity: The Case of Voting (Disponibile anche in italiano). --LUIGI SBRIZ, CISM, CRISC, CDPSE
4. Extending Zero Trust to the End User Ecosystem. --GIDEON HAZAM
5. Looking Inside the Magical Black Box. --SIMONA AICH AND GERALD F. BURICH, Ph.D.
6. Case Study: Performing a Cybersecurity Audit of an Electric Power Transmission Systems Operator. --BOSTJAN DELAK, Ph.D., CISA, AND MIROSLAV KRANJC, Ph.D.
7. Business and Technology Drivers for Decentralized Cloud Systems. --ROBERT PUTRUS, CISM, CE, PE, PMP
PLUS
1. Crossword Puzzle. --MYLES MELLOR
2. CPE Quiz
3. ISACA Bookstore Supplement
1. Guest Editorial. --RINKI SETHI, CISA
2. Information Security Matters: Advertising Information Security. --STEVEN J. ROSS, CISA, CDPSE, ABCI, MBCP
3. IS Audit in Practice: Building Digital Trust Through Advocacy. --CINDY BATER, CISA, ITIL OUNDATION
4. The Bleeding Edge: Infrastructure as Code: Digital Trust Enabler?. --ED MOYLE, CISSP
5. The Digital Trust Imperative:Defining, Establishing and Measuring Digital Trust. --K. BRIAN KELLEY, CISA, CDPSE, CSPO, MCSE, SECURITY
FEATURES
1. Reality Check: The Use of Big Data and Predictive Data. --KEVIN M. ALVERO, CISA, CDPSE, CFE
2. Toward Rebuilding Data Trust. --GUY PEARCE, CGEIT, CDPSE
3. How to Digitally Verify Human Identity: The Case of Voting (Disponibile anche in italiano). --LUIGI SBRIZ, CISM, CRISC, CDPSE
4. Extending Zero Trust to the End User Ecosystem. --GIDEON HAZAM
5. Looking Inside the Magical Black Box. --SIMONA AICH AND GERALD F. BURICH, Ph.D.
6. Case Study: Performing a Cybersecurity Audit of an Electric Power Transmission Systems Operator. --BOSTJAN DELAK, Ph.D., CISA, AND MIROSLAV KRANJC, Ph.D.
7. Business and Technology Drivers for Decentralized Cloud Systems. --ROBERT PUTRUS, CISM, CE, PE, PMP
PLUS
1. Crossword Puzzle. --MYLES MELLOR
2. CPE Quiz
3. ISACA Bookstore Supplement
Ross, Steven J. - Personal Name
HAZAM, GIDEON - Personal Name
SBRIZ, LUIGI - Personal Name
BATER, CINDY - Personal Name
SETHI, RINKI - Personal Name
Putrus, Robert - Personal Name
Pearce, Guy - Personal Name
Kelley, K. Brian - Personal Name
Alvero, Kevin M. - Personal Name
Moyle, Ed - Personal Name
Mellor, Myles - Personal Name
Delak, Bostjan - Personal Name
AICH, SIMONA - Personal Name
HAZAM, GIDEON - Personal Name
SBRIZ, LUIGI - Personal Name
BATER, CINDY - Personal Name
SETHI, RINKI - Personal Name
Putrus, Robert - Personal Name
Pearce, Guy - Personal Name
Kelley, K. Brian - Personal Name
Alvero, Kevin M. - Personal Name
Moyle, Ed - Personal Name
Mellor, Myles - Personal Name
Delak, Bostjan - Personal Name
AICH, SIMONA - Personal Name
Vol. 1, 2023
1944-1967
e-Journal PTI
Inggris
ISACA
2023
USA
59 hlm
LOADING LIST...
LOADING LIST...