Home

Message to Our Members

Dear Members,

 
Take advantage of some of the resources that ISACA International has for you. 

ISACA BLOG

Get in the conversation with leaders, experts, and practitioners in your field and beyond.

ISACA Now offers global perspectives and real-time insights on the evolving challenges and opportunities facing our professional community.


The ISACA Podcast

Discover a podcast series that speaks to you and your career. Click the picture below to browse recent podcasts

5 Reasons You Should Start a Podcast | Inc.com

 

ISACA Certification: Which ISACA Certification is Right for You?

Why certify? ISACA certifications are globally accepted and recognized, and they give you the credibility you need on your quest for career advancement. Certification proves to employers that you have what it takes to add value to their enterprise. In fact, recent  independent studies have consistently rated ISACA’s designations among the highest impactful certifications that an IT professional can earn. If you want to boost your earning potential as well as enhance your professional credibility and recognition, click on one of the pictures below to begin your path to certification.


















Ready to take your career to the next level but not sure which ISACA certification fits your best? Click on the picture above to learn more about each certification. 


 

For further information about our chapter, please email: President@scisaca.org


RSS for Governance & Risk Management

  • Award recognizes leading technology provider for fostering a supportive, fulfilling, and rewarding workplace September 15, 2022 Riskonnect, the leader in integrated risk management (IRM) solutions, today announced it has been named in Business Insurance’s annual Best Places to Work in Insurance program, which recognizes employers for their outstanding performance in establishing workplaces where employees [...] The post Riskonnect Named in Business Insurance’s Best Places to Work in Insurance Program for Second Consecutive Year appeared first on Riskonnect .
  • Every project team shoots for success, so you might assume that risk mitigation techniques in project management would be high on the agenda. Yet only about a third of project teams practice risk management regularly. And some claim to never use risk management. Negative project outcomes can carry difficult consequences. Missed deadlines, budget overruns, [...] The post 5 Key Risk Mitigation Techniques in Project Management appeared first on Riskonnect .
  • Financial compliance is not just about following the rules, it’s about building confidence among your people, investors, and customers that you’re doing more than checking the box. As the scope and complexity of regulation in the financial services industry continues to expand, are you prepared for the challenges that could affect your ability to [...] The post Financial Compliance: The Top 5 Challenges appeared first on Riskonnect .
  • Download the Case study Challenge Transport for London has hundreds of projects underway at any given time – and smooth ride to completion is a priority. The integrated transport authority is responsible for running the day-to-day operations of London’s public transportation network, which includes the London Underground, as well as roads, [...] The post Transport for London Keeps the City Moving with Riskonnect appeared first on Riskonnect .
  • A risk maturity model is a tool to assess the effectiveness of an organization’s risk management efforts. In other words, how well do your functions and processes enable risk-aware decisions that support key enterprise objectives? Risk maturity models are an excellent way for organizations to examine the current program’s proficiency and compare that to [...] The post How to Use a Risk Maturity Model to Level Up appeared first on Riskonnect .

RSS for CyberSecurity

  • A major financial services company has learned the hard way about the importance of proper disposal of customers' personal data The post What to consider before disposing of personal data – Week in security with Tony Anscombe appeared first on WeLiveSecurity
  • The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits? The post 5 tips to help children navigate the internet safely appeared first on WeLiveSecurity
  • Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication? The post Hey WeLiveSecurity, how does biometric authentication work? appeared first on WeLiveSecurity
  • Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device The post Can your iPhone be hacked? What to know about iOS security appeared first on WeLiveSecurity
  • The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products The post Rising to the challenges of secure coding – Week in security with Tony Anscombe appeared first on WeLiveSecurity