ISACA
Edit

ISACA

https://www.isaca.org/
Last activity: 13.06.2025
Active
Categories: AssuranceBusinessCybersecurityInformationITLearnNonprofitSecurityTechnologyTraining
A global IT association and learning community for more than 50 years. We’re 165,000 members strong i
Website visits
3.2M /mo.
Mentions
196
Location: United States, Illinois, Schaumburg
Employees: 201-500
Phone: +1 847-253-1545
Founded date: 1969

Mentions in press and media 196

DateTitleDescription
13.06.2025Top 5 Skills Entry-Level Cybersecurity Professionals NeedImage: Envato/s_kawee Investing in junior and intermediate-level employees can strengthen cybersecurity teams, nonprofit professional organization ISC2 found in its survey of cybersecurity hiring trends. In addition, despite global economic...
12.05.2025New Training Programme Seeks to Bridge Cybersecurity Gender GapEnrolment is now open for the She@Cyber programme, a new Erasmus+ training initiative designed to help close the gender gap in cybersecurity by equipping women and other underrepresented groups with practical, beginner-friendly digital skil...
16.04.2025New Open Letter Urges Swift Audit Reform for UK Digital ResilienceA new open letter has been sent to Rt Hon Jonathan Reynolds MP, secretary of state for business and trade, stressing the urgent need for audit reform legislation to boost digital resilience in the UK. The letter underlines stakeholder suppo...
28.03.2025The Digital Dilemma: Nigeria's Data Cost Crisis and the Call for ChangeIn Nigeria, the internet is more than a luxury; it’s a lifeline. It connects people to opportunities, education, and the global economy. Yet, a storm is brewing. The recent surge in data costs has left many Nigerians gasping for air. The Se...
27.03.2025Building a safer digital future: Enuma Edmund leads the charge in cyber awareness and AI-powered defenseEdmund Enuma In today’s digital age, cyber threats and attacks are becoming more sophisticated putting individuals, businesses, and even entire nations at risk. Cybersecurity threats encompass malicious activities aimed at gaining unauthori...
05.02.2025Phoenix Cyber Appraised at CMMI Level 3Phoenix Cyber, a provider of consulting services to the federal government, has been appraised at level 3 of ISACA’s Capability Maturity Model Integration. This milestone reinforces our commitment to delivering exceptional value to our fede...
29.01.2025ISACA Introduces Certified Cybersecurity Operations Analyst CredentialISACA’s State of Cybersecurity survey report found that the two top factors for determining qualified candidates for jobs are prior hands-on experience (73%) and credentials held (38%). To help employers find qualified candidates and help c...
22.01.2025The Shadow of Shadow IT: Navigating the Hidden Risks in Corporate TechnologyIn the modern corporate landscape, technology is both a boon and a bane. The rise of Shadow IT—applications and systems used without the IT department's knowledge—has become a double-edged sword. It offers agility but invites chaos. The cor...
21.01.2025Privacy Budgets Set to Decrease in 2025, According to ISACAMore than two in five (45%) privacy professionals in Europe believe that their organisation’s privacy budget is underfunded. This marks an increase from 41% in 2024 – and more than half (54%) expect budgets to decrease further in 2025. That...
19.01.2025Аудит Shadow ITТеневые ИТ (Shadow IT) — это те ИТ, которые появляются в компании, минуя ИТ департамент, в том числе самописки, сложные системы макросов, парсеры, сторонние ноутбуки, флешки, смартфоны. Большой новый класс Shadow IT – это ИИ помощники, испо...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In