您的购物车中还没有添加任何物品
框架, 标准和模型带来了多年的实践, tested guidance and global wisdom to your corner of the IS/IT world.
Explore conversations with leaders, experts and practitioners in the ISACA Now Blog.
Use our robust search to find the wisdom, tools and training you seek in seconds.
Explore the globally recognized framework for the governance of enterprise IT.
Gain insights and grow your know-how with expert-developed white papers, 讨论, 程序和工具.
Use the right frameworks to add value to your role and enterprise.
Read through peer-reviewed, in-depth articles on pressing industry topics.
博客、播客和时事通讯. Explore the latest on industry standards, best practices and emerging trends.
网络, 学习, and discuss relevant business topics and best practices with colleagues around the world.
The Payment Card Industry Data Security Standard (PCI DSS) is a framework designed by major credit card brands that lays a foundation of stringent security controls to reduce fraud as it pertains to cardholder data.
Although enterprises strive to take mitigating measures, the question remains: Will they be enough when—not if—a major disruption occurs?
Embracing balanced management approaches can position internal audit as a key player in driving organizational innovation.
A manufacturing enterprise recently experienced disruption and near collapse after a fire destroyed its main production facility.
ISACA has updated its 网络安全审计 Program, adapted from the National Institute of Standards and Technology (NIST) 网络安全 Framework 2.0(2024年2月上映).
As the use of AI increases and becomes more integral in enterprise product and service delivery, 它将接受更多的审计审查.
In the fast-developing digital landscape of the 21st century, the deep web is a baffling hidden world where cybercriminals orchestrate a variety of illicit activities.
美国前总统杜鲁门曾经说过, “It is amazing what you can accomplish if you do not care who gets the credit.
安全是每个人的责任. And although instilling a security culture in an organization is not always easy, it is essential.
Policies are designed to formally document and communicate required and prohibited activities and behaviors to guide enterprise operational processes.
Artificial intelligence (AI) has become ubiquitous in daily life, from healthcare and finance to virtual assistants and autonomous vehicles.
This book is a comprehensive overview of the rapidly advancing field of artificial intelligence (AI).
The cyberthreat landscape is continually expanding as more enterprises and critical infrastructures increase their attack surfaces owing to their connectivity to the Internet.
ISACA’s Digital Trust Ecosystem Framework (DTEF) can help enterprises ensure that broad organizational objectives and goals—including those relying on collecting and processing personal information—align with privacy objectives and compliance requirements.
澳门赌场官方下载 governance of information and technology (EGIT) and business-IT alignment are crucial to create value and achieve the goals and objectives of IT.
Technology control testing is a comprehensive evaluation of an enterprise’s technological infrastructure, 系统和过程.