Jorge Carrillo, who has earned more ISACA certifications than anyone in the world, says the lessons he has learned from his numerous credentials extend well beyond the exam content.
ROI Example: AI Implementation in a Retail Chain A large retail chain implements an AI-driven inventory management system to optimize its supply chain. The system uses algorithms to predict stock ...
At first glance, the topics of cybersecurity and environmental, social and governance (ESG) initiatives seem a bit distant from one another. Despite several sources publishing their linkages (e.g., ...
When teams fail to defensibly dispose of data and uphold rigorous deletion and retention practices across all information sources, an array of legal, compliance, financial, and operational risk can ...
With times of economic uncertainty on the horizon, ongoing talk of the ever-present skills gap and layoffs across many industries, cybersecurity professionals are wondering what to expect in the ...
As digital transformation continues to drive business innovation and operational efficiency, the importance of data privacy and protection has reached unprecedented levels. The increasing frequency ...
As the world becomes increasingly reliant on technology, the attack surface of cyberspace continues to expand. Cyberthreats have grown more sophisticated, posing significant risk to individuals, ...
Author: Ejona Preçi, CISM, CRISC, ITIL v4, and Peter H. Gregory, CISA, CISM, CRISC, CDPSE, CCSK, CISSP, DRCE ...
From unlocking an iPhone to auto-tagging Facebook photos to employers tracking productivity and police forces surveilling protests, facial recognition technology (FRT) is becoming increasingly ...
Over the past few years, there has been a tremendous shift toward emerging technologies such as blockchain, robotics and artificial intelligence (AI). Global organizations and governments have come to ...
AI Is reshaping the future of work—are you ready? ISACA’s 2025 AI Pulse Poll reveals a powerful finding: AI expertise isn’t just nice to have—it’s now essential. This global study of 3,029 digital ...
As enterprises grow larger and become more reliant on external vendors, it becomes necessary to establish effective vendor management programs. Vendor management is a fundamentally critical function ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results