When you want guidance, insight, tools and more, you’ll find them in the resources ISACA puts at your disposal.
Use our Resource Center interactive search tool to find the wisdom, tools and training you seek in seconds.
ISACA resources are compiled, written, reviewed and developed from the real-world experiences of experts in the field.
Explore the globally recognized framework for the governance of enterprise IT.
Insights and Expertise
Gain insights and grow your know-how with expert-developed white papers, discussions, programs and tools.
Frameworks, Standards and Models
Use the right frameworks to add value to your role and enterprise.
Read through peer-reviewed, in-depth articles on pressing industry topics.
News & Trends
Blogs, Podcast and Newsletters. Explore the latest on industry standards, best practices and emerging trends.
What Do You Think About When You Hear the Words “Cybersecurity” and “Breaches”?
Cybersecurity refers to the technologies and processes implemented to help protect computers and networks from unauthorized access or attacks. A breach is an incident in which confidential information is viewed, stolen or utilized by an unauthorized individual.27 March 2020
Learning is Evolving, Whether We Like it or Not. So Is ISACA.
No doubt, these are challenging times. Aside from dealing with all the stress at home, where those of us with kids are seeing them face anxiety adjusting to a normal they were never prepared for, we also, as adults, are learning to work differently.26 March 2020
Information Security Matters: Information Systems in the Time of Flu
I am not in the public health field either, so if you are concerned about the ability of doctors and hospitals to withstand the surge of demand that a pandemic will bring, speak with your local medical authorities.Author: Steven J. Ross
Securing Citizens’ Data in an Era of Connected Societies
Southeast Asia has some of the biggest cities in the world, such as Manila, Jakarta and Bangkok, with close to 47% of the local population living in cities. As governments strive to build future cities, where infrastructure and public delivery are connected and seamlessly enabled by digital advancement...25 March 2020
Five Steps to Realize Your Data Driven Digital Transformation Strategy
In today’s “data is the new oil” era, no one can say an organization is able to achieve digital transformation without data. Executives and even the board level are talking about data-driven business strategy when they develop business objectives and goals.24 March 2020
The Importance of Preparing for a Ransomware Attack Hits Close to Home
As a cybersecurity professional, I work with organizations every day to enhance the various aspects of their cybersecurity programs, from foundational capabilities such as data classification to more tactical functions like incident response. I’ve seen the real-world impacts that various types of attacks have on an organization and the efforts that go into recovery.19 March 2020
Avoid Having to Run Somewhere From Ransomware, Part 2: Top 10 Steps to Stay Protected
Ransomware can be defined as a malware deployed for the specific purpose of denying access to a victim’s systems and/or files until something of value is exchanged. The primary motivating factor for most ransomware attacks is clearly in the name, a ransom. Part 1 of this article series reviewed several prominent examples of the damage caused by recent ransomwares attacks...Authors: Syed Ishaq and Faizan Mahmood
Cybersecurity Survey Results Reveal Hiring Struggles Persist, More Diversity Progress Needed
ISACA recently released part 1 of its State of Cybersecurity 2020 survey report, which found that cybersecurity teams are still struggling with hiring and retention, with very little improvement from last year.18 March 2020
Building A Governance System: A Review of Information Flow and Items Component
The COBIT 2019 framework defines seven components of a governance system that individually and collectively contribute to the good operations of the enterprise system over information and technology. Among those components is information flow.17 March 2020
A Message from David: Navigating COVID-19
As a global community, we immediately feel the effects of a global crisis because it affects our families, our communities, our jobs and our professions everywhere. So I first want to share my concern for your well-being and talk about steps we are taking to help.16 March 2020
Avoid Having to Run Somewhere From Ransomware, Part 1: Understanding Ransomware and the Criminals Who Spread It
An average of 4,000 ransomware incidents occur daily in the United States at an annual cost of US$1 billion. The number of ransomware attacks more than doubled in 2019, with the average payment per incident coming in at US$41,198 (up from US$6,733 in 2018). Insurance companies are forecasting...Authors: Syed Ishaq and Faizan Mahmood