Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

High Impact Analytics Podcasts

show episodes
 
Artwork

1
The Retail Journey

High Impact Analytics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Retail Journey where we will cover important topics, interview industry stakeholders, and address emerging trends as we journey through our mission of helping our listeners thrive in retail. Your hosts for this show are CEO James Harris and CGO Charles Greathouse.
  continue reading
 
Artwork

1
HR Leaders

Chris Rainey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join host Chris Rainey on the HR Leaders Podcast, where he sits down with top Chief People Officers, CHROs, and leading HR experts to uncover the strategies, trends, and insights shaping the future of human resources. Each episode dives into best practices in people management, leadership challenges, and transformative HR innovations that impact both business success and society at large. Whether you're an HR professional or simply passionate about modern workplace strategies, this podcast d ...
  continue reading
 
Artwork
 
Join top global people leaders for honest conversations about how to build and transform high-performing cultures. Hear from CHROs and HR experts from global and world-renowned organisations as they share their top people analytics tips, leadership journeys, lessons and challenges while navigating the complexities of transformation and the multi-generational and diverse cultures in Asia.
  continue reading
 
Artwork
 
Leveraging data effectively is complex and challenging. Ekimetrics is here to explain it in everyday terms – getting straight to the heart of how to use data to help your business. On our Ekimetrics (Eng) Podcast, you can expect straightforward conversations with leading figures across different industries – from retail and leisure to financial services and automotive - and partners such as Meta and YouTube. We explore the challenges facing leadership teams and how unique data insights and o ...
  continue reading
 
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
  continue reading
 
Capitalmind looks at stocks, bonds, funds and the macro to bring you their view on the Indian financial markets. We discuss all things related to investing at our focussed podcast that keeps it simple. For more, go to capitalmind.in and to invest with us, visit capitalmindwealth.com
  continue reading
 
Beyond the Prompt dives deep into the world of AI and its expanding impact on business and daily work. Hosted by Jeremy Utley of Stanford's d.school, alongside Henrik Werdelin, an entrepreneur known for starting BarkBox, prehype and other startups, each episode features conversations with innovators and leaders to uncover pragmatic stories of how organizations leverage AI to accelerate success. Learn creative strategies and actionable tactics you can apply right away as AI capabilities advan ...
  continue reading
 
Orbition Group is delighted to bring you this podcast series, which is designed for Data Enthusiasts, to hear from some of the most high-profile Data, Analytics and AI thought leaders from around the globe. Each episode will detail the guests journey to the top while bringing unique insights, drawn from first-hand experience on the industry’s most trending topics. This podcast was created as a way for our industry's most respected leadership figures from across the world to give back to the ...
  continue reading
 
Artwork

1
Your DEI Minute™

Equity at Work

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Your DEI Minute™ is your go-to podcast for leaders looking to navigate the ever-evolving landscape of diversity, equity, and inclusion in the workplace. Whether you're just starting out with DEI or looking to sustain your long-term successes, each episode will provide you with actions you can take to move DEI forward at your organization, all in 15 minutes or less.
  continue reading
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Welcome to "On the Record," the podcast that blends the best of business and music. Join us as we dive into timely, topical happenings in the business world. Our guests offer thought-provoking opinions and insights to help you scale your ideas, and our hard-hitting subject matter doesn't shy away from taking an unpopular stance. We’re disruptors and we don't apologize for it. Along the way, we'll sprinkle in discussions about our personal music interests, relating them back to the topic at h ...
  continue reading
 
Artwork

1
The Risky Planner™

Albert & Nate w/Dokainish & Company

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Capital projects waste billions annually on predictable delays, but there's a proven way to deliver ahead of schedule and under budget. Join Albert Brier, Director, Project Controls and Nate Habermeyer, Director, Marketing at Dokainish & Company, as they discuss how current events and trends are reshaping project controls and mega-projects across industries. This podcast is designed for project managers, project controls professionals, IT leaders, and executives. Our listeners grapple with h ...
  continue reading
 
Loading …
show series
 
Today’s guest is Brad Kennedy, Senior Director of Business Solutions Strategy at Orlando Health. Brad joins Emerj Senior Editor Matthew DeMello to explore what it takes to implement AI across a complex care environment. From improving patient experience to easing clinician burdens, Kennedy highlights the need for precision, transparency, and collab…
  continue reading
 
Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evolving regulatory landscapes. You will learn how to audit control readiness, policy alignment, and adoption strategies—essential knowledge for CISA ques…
  continue reading
 
Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhancements, and review post-audit actions. You will also explore how these contributions strengthen governance and demonstrate audit value on the CISA exam.…
  continue reading
 
Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candi…
  continue reading
 
Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently app…
  continue reading
 
IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and data sanitization. These areas are tested in Domain 4 and require auditors to verify asset traceability, accountability, and risk mitigation. Ready to …
  continue reading
 
Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling procedures. You will also learn how to assess program maturity and legal compliance, which are critical for high-scoring performance on the CISA exam. Rea…
  continue reading
 
Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how auditors assess alignment with policies and regulatory requirements, making this a key episode for Domain 2 and Domain 5 exam success. Ready to start your …
  continue reading
 
Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management processes, and monitoring controls. The CISA exam frequently tests your ability to identify deficiencies in daily IT operations. Ready to start your jo…
  continue reading
 
Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology standards, and decision-making roles. You will also explore how to audit EA for strategic alignment and integration with enterprise risk management. Ready …
  continue reading
 
Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training services. You will also learn how to evaluate whether support metrics align with service level expectations and risk management goals. Ready to start y…
  continue reading
 
Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potential. You will also learn how to verify controls over third-party access and subcontractors, all of which are relevant for audit scenarios on the CISA ex…
  continue reading
 
Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate procurement criteria, due diligence processes, contract terms, and ongoing monitoring practices. These concepts are frequently tested on the CISA exam in q…
  continue reading
 
Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-making. You will learn how auditors validate metric accuracy, relevance, and consistency with business goals, all of which are crucial for mastering Do…
  continue reading
 
Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation, and compliance with internal standards. Understanding ownership structure is a critical aspect of governance and frequently appears in CISA scenarios …
  continue reading
 
To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource allocation, project portfolio oversight, scheduling practices, and strategic alignment. You will also learn how to identify gaps in resource governance that …
  continue reading
 
Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You will also explore the relationship between governance maturity and audit planning as emphasized in the CISA exam. Ready to start your journey with con…
  continue reading
 
IT strategy must support business goals and risk tolerance. In this episode, you will learn how to assess whether IT initiatives are aligned with enterprise objectives, supported by governance, and tracked with appropriate metrics. Strategic alignment is a frequent theme in Domain 2 and appears in exam scenarios involving IT oversight. Ready to sta…
  continue reading
 
Audit functions must be continuously evaluated and improved. This episode covers quality assurance techniques including internal assessments, external reviews, performance metrics, and lessons learned. You will learn how to audit the audit function itself and ensure compliance with professional standards. Ready to start your journey with confidence…
  continue reading
 
Automated systems introduce unique risks and controls. This episode teaches you how to audit robotic process automation, decision engines, AI tools, and algorithmic logic. You will learn how to assess governance, bias, and control design in technology-driven environments, which are increasingly tested on the CISA exam. Ready to start your journey w…
  continue reading
 
Data analytics is transforming how audits are conducted. In this episode, you will explore how to apply analytic tools for risk assessment, control testing, and anomaly detection. You will also learn how to evaluate data quality and integrate analytics into audit workflows, aligning with CISA’s emphasis on technology-enabled audits. Ready to start …
  continue reading
 
The audit is not complete until findings have been addressed. This episode focuses on follow-up activities, including how to verify remediation, reassess risk, and update stakeholders. You will learn how to document follow-up results and integrate them into future audit planning, a key topic for CISA candidates. Ready to start your journey with con…
  continue reading
 
Effective communication is a key skill for audit professionals. This episode covers how to present findings clearly, structure audit reports, and develop actionable recommendations. You will also learn how to handle disagreements with stakeholders and follow up on implementation, all of which are part of ISACA’s expectations. Ready to start your jo…
  continue reading
 
Auditors often lead projects that require formal planning and control. This episode explains how to apply project management principles within the audit context. Topics include scheduling, resourcing, risk management, and change tracking, all of which help auditors deliver results efficiently and are emphasized in the CISA exam. Ready to start your…
  continue reading
 
This episode focuses on ISACA's audit standards and how to apply them during each phase of the audit process. You will learn how to ensure consistency, quality, and ethical conduct in your audits. Key topics include evidence collection, documentation, communication, and stakeholder engagement, all of which are tested on the CISA exam. Ready to star…
  continue reading
 
Audit planning is the foundation of a successful engagement. In this episode, you will learn how to define audit scope, assess risk, allocate resources, and align objectives with organizational priorities. The CISA exam emphasizes your ability to create structured, risk-based audit plans that support clear execution. Ready to start your journey wit…
  continue reading
 
Auditors may need to evaluate how evidence is preserved and used in investigations. This episode introduces forensic readiness, chain of custody, data integrity controls, and tool validation. You will also explore how forensic practices align with legal requirements and audit objectives in Domain 5. Ready to start your journey with confidence? Lear…
  continue reading
 
Incident response is a structured process that minimizes damage and recovers operations. This episode covers detection, escalation, containment, recovery, and reporting. You will learn how to evaluate incident handling procedures, assess team readiness, and align response plans with audit requirements. Ready to start your journey with confidence? L…
  continue reading
 
Ongoing monitoring is vital for detecting and responding to threats. In this episode, you will explore how to evaluate log management, SIEM systems, network monitoring tools, and intrusion detection. Auditors must assess coverage, alerting capabilities, and response documentation to support Domain 5 objectives. Ready to start your journey with conf…
  continue reading
 
Security testing reveals weaknesses before attackers can exploit them. This episode explains how to audit vulnerability scanning, penetration testing, static code analysis, and system hardening. You will also learn how to interpret test results and validate remediation, which are common elements in Domain 5 questions. Ready to start your journey wi…
  continue reading
 
To audit effectively, you must understand how systems are attacked. This episode introduces common techniques such as phishing, malware, denial of service, and SQL injection. You will learn how to assess organizational preparedness and how this knowledge applies to audit procedures and CISA scenario questions. Ready to start your journey with confi…
  continue reading
 
Human error is a top cause of security breaches. This episode covers how to evaluate security awareness training programs, including content quality, delivery methods, tracking, and feedback mechanisms. You will also learn how to link training effectiveness with audit findings and policy compliance. Ready to start your journey with confidence? Lear…
  continue reading
 
Endpoint diversity brings complexity to audits. In this episode, you will learn how to evaluate controls for mobile devices, wireless networks, and Internet of Things technologies. Topics include encryption, mobile device management, authentication, and endpoint hardening, all of which are relevant to CISA Domain 5. Ready to start your journey with…
  continue reading
 
Cloud and virtual systems require unique controls and audit approaches. This episode focuses on how to evaluate cloud security, shared responsibility models, virtual machine management, and containerization. You will also explore how to assess compliance and data protection within cloud-based infrastructures. Ready to start your journey with confid…
  continue reading
 
Public Key Infrastructure supports digital trust by enabling secure authentication and communication. In this episode, you will learn how to audit PKI components, such as certificate authorities, digital signatures, and key lifecycles. Understanding how PKI works and how to evaluate its controls is vital for passing Domain 5. Ready to start your jo…
  continue reading
 
Encryption is one of the most powerful tools for protecting sensitive data. This episode explains how to audit encryption in transit and at rest, evaluate key management practices, and assess alignment with organizational policies and legal requirements. These concepts are essential for Domain 5 and appear frequently in security-related CISA exam q…
  continue reading
 
Data loss prevention (DLP) tools and policies help prevent unauthorized exposure of sensitive information. In this episode, you will learn how to evaluate DLP strategy, endpoint protections, outbound filtering, and audit logging. This is a highly tested topic that connects information protection with compliance and incident response. Ready to start…
  continue reading
 
Network and endpoint security controls are essential for protecting IT infrastructure. This episode explains how to audit firewalls, intrusion detection systems, antivirus software, and patching procedures. You will also learn how to assess monitoring practices and system hardening strategies for Domain 5. Ready to start your journey with confidenc…
  continue reading
 
Access control is a critical concept tested throughout the CISA exam. In this episode, you will learn how to audit identity provisioning, authentication mechanisms, access reviews, and privilege management. Understanding IAM controls will help you confidently address scenarios involving security, compliance, and fraud prevention. Ready to start you…
  continue reading
 
Physical security is a foundational element of protecting information systems. This episode covers perimeter defenses, badge access, fire suppression, climate control, and secure equipment disposal. You will learn how to evaluate the effectiveness of these controls and how questions about physical risks show up on the CISA exam. Ready to start your…
  continue reading
 
Security frameworks provide the structure for implementing effective controls. In this episode, you will learn how to evaluate ISO 27001, NIST, COBIT, and organizational guidelines. You will also explore how auditors assess alignment with policies and determine whether information protection is governed effectively. Ready to start your journey with…
  continue reading
 
Domain 5 is all about securing information against unauthorized access, alteration, or loss. This episode provides a strategic overview of confidentiality, integrity, and availability principles and introduces the areas covered by this domain. You will see how security audits connect with governance, operations, and compliance. Ready to start your …
  continue reading
 
Disaster recovery focuses on restoring IT systems after an outage or catastrophic event. In this episode, you will learn how to audit DR plans, assess backup infrastructure, evaluate recovery site readiness, and verify testing procedures. DR planning is a key area of the CISA exam, especially for questions on system availability and continuity. Rea…
  continue reading
 
Business continuity planning ensures the organization can operate during and after disruptions. This episode explains how auditors evaluate continuity plan development, critical process identification, training, and documentation. You will also learn how plans are tested and updated to remain effective under real-world conditions. Ready to start yo…
  continue reading
 
Backup and restoration processes are critical for protecting data integrity and ensuring continuity. In this episode, you will learn how to evaluate backup frequency, storage media security, offsite storage protocols, and restoration testing. Understanding these controls is essential for CISA exam topics related to recovery readiness and operationa…
  continue reading
 
Operational resilience is about sustaining essential services under stress. This episode explains how auditors evaluate systems for fault tolerance, high availability, and continuous operation. You will learn how to assess risk mitigation strategies, redundancy planning, and the effectiveness of proactive monitoring. These areas are core to Domain …
  continue reading
 
The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of critical functions, and evaluate recovery time and recovery point objectives. CISA candidates must understand how to validate BIA results and tie them to continuity plans. Ready to start…
  continue reading
 
Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recovery, redundancy, and failover. You will learn how to evaluate resilience strategies and how they relate to the audit objectives covered in Domain 4 and beyond. Ready to start your jour…
  continue reading
 
Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures, configuration changes, and performance optimization. You will gain insight into how to audit database environments using the lens of confidentiality, integrity, and availability. Re…
  continue reading
 
Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach handling, and vendor service reporting. These concepts are tested frequently in Domain 4, especially in questions that examine governance and performance alignment. Ready to start your j…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play