ISACA Journal: Interruptions, Disruptions, and Impact of Emergencee, Vol. 2, 2023
DEPARTMENTS
1. Information Security Matters: Who Leads Cyberresilience?. --STEVEN J. ROSS, CISA, CDPSE, AFCI, MCP
2. IS Audit in Practice: Data Integrity On Demand. --CINDY BAXTER, CISA, ITIL FOUNDATION
3. The Bleeding Edge: API Sprawl and Emergence. --ED MOYLE, CISSP
4. The Digital Trust Imperative: The Impact of Relationships on Trustworthiness. --K. BIAN KELLEY , CISA, CDPSE, CSPO, MCSE, SECUIT
FEATURES
1. Is Detrimental Unexpected IT Emergence Inevitable?. --GUY PEARCE, CGEIT, CDPSE
2. Cloud Computing Evolution and Regulation in the Financial Services Industry. --KILIAN TRAUTMANN, CISA
3. The Potential Impact of the European Commission’s Proposed AI Act on SMEs. --JAKOB GASSAUER, GERALD F. BURC, Ph.D.
4. Identifying and Preparing for Interruptions, Disruptions and Emergence. --ANANTHA SAYANA, CISA, CISM, CIA
5. Case Study: Taming Unruly Data to Improve Compliance. --MICK BRADY
6. Digital Trust and the Audit Function. --GOPIKIRSHNA BUTAKA, CISA, CDPSE, CEH, ISO 27001 LA
7. Protecting Industrial Control System Software With Secure Coding Practices. --MATTHEW J. SCOTT, CICP, CM,
LEAN SIX SIGMA BLACK BELT
PLUS
1. Crossword Puzzle. --MYLES MELLOR
2. CPE Quiz
3. ISACA Bookstore Supplement.
1. Information Security Matters: Who Leads Cyberresilience?. --STEVEN J. ROSS, CISA, CDPSE, AFCI, MCP
2. IS Audit in Practice: Data Integrity On Demand. --CINDY BAXTER, CISA, ITIL FOUNDATION
3. The Bleeding Edge: API Sprawl and Emergence. --ED MOYLE, CISSP
4. The Digital Trust Imperative: The Impact of Relationships on Trustworthiness. --K. BIAN KELLEY , CISA, CDPSE, CSPO, MCSE, SECUIT
FEATURES
1. Is Detrimental Unexpected IT Emergence Inevitable?. --GUY PEARCE, CGEIT, CDPSE
2. Cloud Computing Evolution and Regulation in the Financial Services Industry. --KILIAN TRAUTMANN, CISA
3. The Potential Impact of the European Commission’s Proposed AI Act on SMEs. --JAKOB GASSAUER, GERALD F. BURC, Ph.D.
4. Identifying and Preparing for Interruptions, Disruptions and Emergence. --ANANTHA SAYANA, CISA, CISM, CIA
5. Case Study: Taming Unruly Data to Improve Compliance. --MICK BRADY
6. Digital Trust and the Audit Function. --GOPIKIRSHNA BUTAKA, CISA, CDPSE, CEH, ISO 27001 LA
7. Protecting Industrial Control System Software With Secure Coding Practices. --MATTHEW J. SCOTT, CICP, CM,
LEAN SIX SIGMA BLACK BELT
PLUS
1. Crossword Puzzle. --MYLES MELLOR
2. CPE Quiz
3. ISACA Bookstore Supplement.
Ross, Steven J. - Personal Name
BUTAKA, GOPIKIRSHNA - Personal Name
SAYANA, ANANTHA - Personal Name
GASSAUER, JAKOB - Personal Name
TRAUTMANN, KILIAN - Personal Name
Brady, Mick - Personal Name
Pearce, Guy - Personal Name
Kelley, K. Brian - Personal Name
Baxter, Cindy - Personal Name
Moyle, Ed - Personal Name
SCOTT, MATTHEW J. - Personal Name
BUTAKA, GOPIKIRSHNA - Personal Name
SAYANA, ANANTHA - Personal Name
GASSAUER, JAKOB - Personal Name
TRAUTMANN, KILIAN - Personal Name
Brady, Mick - Personal Name
Pearce, Guy - Personal Name
Kelley, K. Brian - Personal Name
Baxter, Cindy - Personal Name
Moyle, Ed - Personal Name
SCOTT, MATTHEW J. - Personal Name
Vol. 2, 2023
1944-1967
e-Journal PTI
Inggris
ISACA
2023
USA
59 hlm
LOADING LIST...
LOADING LIST...