Welcome to the Retail Journey where we will cover important topics, interview industry stakeholders, and address emerging trends as we journey through our mission of helping our listeners thrive in retail. Your hosts for this show are CEO James Harris and CGO Charles Greathouse.
…
continue reading
High Impact Analytics Podcasts
Join host Chris Rainey on the HR Leaders Podcast, where he sits down with top Chief People Officers, CHROs, and leading HR experts to uncover the strategies, trends, and insights shaping the future of human resources. Each episode dives into best practices in people management, leadership challenges, and transformative HR innovations that impact both business success and society at large. Whether you're an HR professional or simply passionate about modern workplace strategies, this podcast d ...
…
continue reading
Join top global people leaders for honest conversations about how to build and transform high-performing cultures. Hear from CHROs and HR experts from global and world-renowned organisations as they share their top people analytics tips, leadership journeys, lessons and challenges while navigating the complexities of transformation and the multi-generational and diverse cultures in Asia.
…
continue reading
Leveraging data effectively is complex and challenging. Ekimetrics is here to explain it in everyday terms – getting straight to the heart of how to use data to help your business. On our Ekimetrics (Eng) Podcast, you can expect straightforward conversations with leading figures across different industries – from retail and leisure to financial services and automotive - and partners such as Meta and YouTube. We explore the challenges facing leadership teams and how unique data insights and o ...
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
CPG Guys Fast Forward
…
continue reading
Capitalmind looks at stocks, bonds, funds and the macro to bring you their view on the Indian financial markets. We discuss all things related to investing at our focussed podcast that keeps it simple. For more, go to capitalmind.in and to invest with us, visit capitalmindwealth.com
…
continue reading
Beyond the Prompt dives deep into the world of AI and its expanding impact on business and daily work. Hosted by Jeremy Utley of Stanford's d.school, alongside Henrik Werdelin, an entrepreneur known for starting BarkBox, prehype and other startups, each episode features conversations with innovators and leaders to uncover pragmatic stories of how organizations leverage AI to accelerate success. Learn creative strategies and actionable tactics you can apply right away as AI capabilities advan ...
…
continue reading
Orbition Group is delighted to bring you this podcast series, which is designed for Data Enthusiasts, to hear from some of the most high-profile Data, Analytics and AI thought leaders from around the globe. Each episode will detail the guests journey to the top while bringing unique insights, drawn from first-hand experience on the industry’s most trending topics. This podcast was created as a way for our industry's most respected leadership figures from across the world to give back to the ...
…
continue reading
Your DEI Minute™ is your go-to podcast for leaders looking to navigate the ever-evolving landscape of diversity, equity, and inclusion in the workplace. Whether you're just starting out with DEI or looking to sustain your long-term successes, each episode will provide you with actions you can take to move DEI forward at your organization, all in 15 minutes or less.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Welcome to "On the Record," the podcast that blends the best of business and music. Join us as we dive into timely, topical happenings in the business world. Our guests offer thought-provoking opinions and insights to help you scale your ideas, and our hard-hitting subject matter doesn't shy away from taking an unpopular stance. We’re disruptors and we don't apologize for it. Along the way, we'll sprinkle in discussions about our personal music interests, relating them back to the topic at h ...
…
continue reading
Capital projects waste billions annually on predictable delays, but there's a proven way to deliver ahead of schedule and under budget. Join Albert Brier, Director, Project Controls and Nate Habermeyer, Director, Marketing at Dokainish & Company, as they discuss how current events and trends are reshaping project controls and mega-projects across industries. This podcast is designed for project managers, project controls professionals, IT leaders, and executives. Our listeners grapple with h ...
…
continue reading

1
Keeping the Patient Voice in De-Identified Data Models - with Brad Kennedy of Orlando Health
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44Today’s guest is Brad Kennedy, Senior Director of Business Solutions Strategy at Orlando Health. Brad joins Emerj Senior Editor Matthew DeMello to explore what it takes to implement AI across a complex care environment. From improving patient experience to easing clinician burdens, Kennedy highlights the need for precision, transparency, and collab…
…
continue reading

1
Episode 105: Evaluating Risks of Emerging Technologies and Practices
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evolving regulatory landscapes. You will learn how to audit control readiness, policy alignment, and adoption strategies—essential knowledge for CISA ques…
…
continue reading

1
Episode 104: Providing Guidance on Information Systems Quality Improvement
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhancements, and review post-audit actions. You will also explore how these contributions strengthen governance and demonstrate audit value on the CISA exam.…
…
continue reading

1
Episode 103: Evaluating Threat and Vulnerability Management
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candi…
…
continue reading

1
Episode 102: Evaluating Shadow IT Risks and Controls
11:01
11:01
Play later
Play later
Lists
Like
Liked
11:01Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently app…
…
continue reading

1
Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and data sanitization. These areas are tested in Domain 4 and require auditors to verify asset traceability, accountability, and risk mitigation. Ready to …
…
continue reading

1
Episode 100: Evaluating Privacy and Data Classification Programs
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling procedures. You will also learn how to assess program maturity and legal compliance, which are critical for high-scoring performance on the CISA exam. Rea…
…
continue reading

1
Episode 99: Evaluating Data Governance Program
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how auditors assess alignment with policies and regulatory requirements, making this a key episode for Domain 2 and Domain 5 exam success. Ready to start your …
…
continue reading

1
Episode 98: Evaluating IT Operations and Maintenance Practices
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management processes, and monitoring controls. The CISA exam frequently tests your ability to identify deficiencies in daily IT operations. Ready to start your jo…
…
continue reading

1
Episode 97: Evaluating Enterprise Architecture Alignment
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology standards, and decision-making roles. You will also explore how to audit EA for strategic alignment and integration with enterprise risk management. Ready …
…
continue reading

1
Episode 96: Evaluating End-User Support Processes
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training services. You will also learn how to evaluate whether support metrics align with service level expectations and risk management goals. Ready to start y…
…
continue reading

1
Episode 95: Evaluating Supply Chain Risk and Integrity Issues
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potential. You will also learn how to verify controls over third-party access and subcontractors, all of which are relevant for audit scenarios on the CISA ex…
…
continue reading

1
Episode 94: Evaluating IT Vendor Selection and Contract Management
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate procurement criteria, due diligence processes, contract terms, and ongoing monitoring practices. These concepts are frequently tested on the CISA exam in q…
…
continue reading

1
Episode 93: Evaluating IT Key Performance and Risk Indicators
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-making. You will learn how auditors validate metric accuracy, relevance, and consistency with business goals, all of which are crucial for mastering Do…
…
continue reading

1
Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation, and compliance with internal standards. Understanding ownership structure is a critical aspect of governance and frequently appears in CISA scenarios …
…
continue reading

1
Episode 91: Evaluating IT Resource and Project Management Alignment
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource allocation, project portfolio oversight, scheduling practices, and strategic alignment. You will also learn how to identify gaps in resource governance that …
…
continue reading

1
Episode 90: Evaluating IT Governance Effectiveness
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You will also explore the relationship between governance maturity and audit planning as emphasized in the CISA exam. Ready to start your journey with con…
…
continue reading

1
Episode 89: Evaluating IT Strategy Alignment
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42IT strategy must support business goals and risk tolerance. In this episode, you will learn how to assess whether IT initiatives are aligned with enterprise objectives, supported by governance, and tracked with appropriate metrics. Strategic alignment is a frequent theme in Domain 2 and appears in exam scenarios involving IT oversight. Ready to sta…
…
continue reading

1
Episode 88: Quality Assurance and Improvement of Audit Processes
11:40
11:40
Play later
Play later
Lists
Like
Liked
11:40Audit functions must be continuously evaluated and improved. This episode covers quality assurance techniques including internal assessments, external reviews, performance metrics, and lessons learned. You will learn how to audit the audit function itself and ensure compliance with professional standards. Ready to start your journey with confidence…
…
continue reading

1
Episode 87: Evaluating Automation and Decision-Making Systems
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Automated systems introduce unique risks and controls. This episode teaches you how to audit robotic process automation, decision engines, AI tools, and algorithmic logic. You will learn how to assess governance, bias, and control design in technology-driven environments, which are increasingly tested on the CISA exam. Ready to start your journey w…
…
continue reading

1
Episode 86: Utilizing Data Analytics in Auditing
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24Data analytics is transforming how audits are conducted. In this episode, you will explore how to apply analytic tools for risk assessment, control testing, and anomaly detection. You will also learn how to evaluate data quality and integrate analytics into audit workflows, aligning with CISA’s emphasis on technology-enabled audits. Ready to start …
…
continue reading

1
Episode 85: Conducting Post-Audit Follow-Up
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20The audit is not complete until findings have been addressed. This episode focuses on follow-up activities, including how to verify remediation, reassess risk, and update stakeholders. You will learn how to document follow-up results and integrate them into future audit planning, a key topic for CISA candidates. Ready to start your journey with con…
…
continue reading

1
Episode 84: Communicating Audit Results and Recommendations
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52Effective communication is a key skill for audit professionals. This episode covers how to present findings clearly, structure audit reports, and develop actionable recommendations. You will also learn how to handle disagreements with stakeholders and follow up on implementation, all of which are part of ISACA’s expectations. Ready to start your jo…
…
continue reading

1
Episode 83: Applying Project Management in IS Audits
11:14
11:14
Play later
Play later
Lists
Like
Liked
11:14Auditors often lead projects that require formal planning and control. This episode explains how to apply project management principles within the audit context. Topics include scheduling, resourcing, risk management, and change tracking, all of which help auditors deliver results efficiently and are emphasized in the CISA exam. Ready to start your…
…
continue reading

1
Episode 82: Conducting Audits According to IS Audit Standards
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52This episode focuses on ISACA's audit standards and how to apply them during each phase of the audit process. You will learn how to ensure consistency, quality, and ethical conduct in your audits. Key topics include evidence collection, documentation, communication, and stakeholder engagement, all of which are tested on the CISA exam. Ready to star…
…
continue reading

1
Episode 81: Planning Effective Information Systems Audits
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54Audit planning is the foundation of a successful engagement. In this episode, you will learn how to define audit scope, assess risk, allocate resources, and align objectives with organizational priorities. The CISA exam emphasizes your ability to create structured, risk-based audit plans that support clear execution. Ready to start your journey wit…
…
continue reading

1
Episode 80: Evidence Collection and Digital Forensics
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13Auditors may need to evaluate how evidence is preserved and used in investigations. This episode introduces forensic readiness, chain of custody, data integrity controls, and tool validation. You will also explore how forensic practices align with legal requirements and audit objectives in Domain 5. Ready to start your journey with confidence? Lear…
…
continue reading

1
Episode 79: Security Incident Response Management
11:20
11:20
Play later
Play later
Lists
Like
Liked
11:20Incident response is a structured process that minimizes damage and recovers operations. This episode covers detection, escalation, containment, recovery, and reporting. You will learn how to evaluate incident handling procedures, assess team readiness, and align response plans with audit requirements. Ready to start your journey with confidence? L…
…
continue reading

1
Episode 78: Security Monitoring Tools and Techniques
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03Ongoing monitoring is vital for detecting and responding to threats. In this episode, you will explore how to evaluate log management, SIEM systems, network monitoring tools, and intrusion detection. Auditors must assess coverage, alerting capabilities, and response documentation to support Domain 5 objectives. Ready to start your journey with conf…
…
continue reading

1
Episode 77: Security Testing Tools and Techniques
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46Security testing reveals weaknesses before attackers can exploit them. This episode explains how to audit vulnerability scanning, penetration testing, static code analysis, and system hardening. You will also learn how to interpret test results and validate remediation, which are common elements in Domain 5 questions. Ready to start your journey wi…
…
continue reading

1
Episode 76: Information System Attack Methods and Techniques
11:53
11:53
Play later
Play later
Lists
Like
Liked
11:53To audit effectively, you must understand how systems are attacked. This episode introduces common techniques such as phishing, malware, denial of service, and SQL injection. You will learn how to assess organizational preparedness and how this knowledge applies to audit procedures and CISA scenario questions. Ready to start your journey with confi…
…
continue reading

1
Episode 75: Security Awareness Training and Programs
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52Human error is a top cause of security breaches. This episode covers how to evaluate security awareness training programs, including content quality, delivery methods, tracking, and feedback mechanisms. You will also learn how to link training effectiveness with audit findings and policy compliance. Ready to start your journey with confidence? Lear…
…
continue reading

1
Episode 74: Mobile, Wireless, and IoT Device Security
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32Endpoint diversity brings complexity to audits. In this episode, you will learn how to evaluate controls for mobile devices, wireless networks, and Internet of Things technologies. Topics include encryption, mobile device management, authentication, and endpoint hardening, all of which are relevant to CISA Domain 5. Ready to start your journey with…
…
continue reading

1
Episode 73: Cloud and Virtualized Environments
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Cloud and virtual systems require unique controls and audit approaches. This episode focuses on how to evaluate cloud security, shared responsibility models, virtual machine management, and containerization. You will also explore how to assess compliance and data protection within cloud-based infrastructures. Ready to start your journey with confid…
…
continue reading

1
Episode 72: Public Key Infrastructure (PKI)
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29Public Key Infrastructure supports digital trust by enabling secure authentication and communication. In this episode, you will learn how to audit PKI components, such as certificate authorities, digital signatures, and key lifecycles. Understanding how PKI works and how to evaluate its controls is vital for passing Domain 5. Ready to start your jo…
…
continue reading

1
Episode 71: Data Encryption Methods and Controls
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Encryption is one of the most powerful tools for protecting sensitive data. This episode explains how to audit encryption in transit and at rest, evaluate key management practices, and assess alignment with organizational policies and legal requirements. These concepts are essential for Domain 5 and appear frequently in security-related CISA exam q…
…
continue reading
Data loss prevention (DLP) tools and policies help prevent unauthorized exposure of sensitive information. In this episode, you will learn how to evaluate DLP strategy, endpoint protections, outbound filtering, and audit logging. This is a highly tested topic that connects information protection with compliance and incident response. Ready to start…
…
continue reading

1
Episode 69: Network and Endpoint Security
11:22
11:22
Play later
Play later
Lists
Like
Liked
11:22Network and endpoint security controls are essential for protecting IT infrastructure. This episode explains how to audit firewalls, intrusion detection systems, antivirus software, and patching procedures. You will also learn how to assess monitoring practices and system hardening strategies for Domain 5. Ready to start your journey with confidenc…
…
continue reading

1
Episode 68: Identity and Access Management (IAM)
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31Access control is a critical concept tested throughout the CISA exam. In this episode, you will learn how to audit identity provisioning, authentication mechanisms, access reviews, and privilege management. Understanding IAM controls will help you confidently address scenarios involving security, compliance, and fraud prevention. Ready to start you…
…
continue reading

1
Episode 67: Physical and Environmental Controls
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Physical security is a foundational element of protecting information systems. This episode covers perimeter defenses, badge access, fire suppression, climate control, and secure equipment disposal. You will learn how to evaluate the effectiveness of these controls and how questions about physical risks show up on the CISA exam. Ready to start your…
…
continue reading

1
Episode 66: Information Asset Security Frameworks, Standards, and Guidelines
11:01
11:01
Play later
Play later
Lists
Like
Liked
11:01Security frameworks provide the structure for implementing effective controls. In this episode, you will learn how to evaluate ISO 27001, NIST, COBIT, and organizational guidelines. You will also explore how auditors assess alignment with policies and determine whether information protection is governed effectively. Ready to start your journey with…
…
continue reading

1
Episode 65: Overview of Domain 5 – Protection of Information Assets
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06Domain 5 is all about securing information against unauthorized access, alteration, or loss. This episode provides a strategic overview of confidentiality, integrity, and availability principles and introduces the areas covered by this domain. You will see how security audits connect with governance, operations, and compliance. Ready to start your …
…
continue reading

1
Episode 64: Disaster Recovery Planning Fundamentals
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Disaster recovery focuses on restoring IT systems after an outage or catastrophic event. In this episode, you will learn how to audit DR plans, assess backup infrastructure, evaluate recovery site readiness, and verify testing procedures. DR planning is a key area of the CISA exam, especially for questions on system availability and continuity. Rea…
…
continue reading

1
Episode 63: Developing and Maintaining a Business Continuity Plan
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41Business continuity planning ensures the organization can operate during and after disruptions. This episode explains how auditors evaluate continuity plan development, critical process identification, training, and documentation. You will also learn how plans are tested and updated to remain effective under real-world conditions. Ready to start yo…
…
continue reading

1
Episode 62: Data Backup, Storage, and Restoration Practices
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51Backup and restoration processes are critical for protecting data integrity and ensuring continuity. In this episode, you will learn how to evaluate backup frequency, storage media security, offsite storage protocols, and restoration testing. Understanding these controls is essential for CISA exam topics related to recovery readiness and operationa…
…
continue reading

1
Episode 61: System and Operational Resilience
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15Operational resilience is about sustaining essential services under stress. This episode explains how auditors evaluate systems for fault tolerance, high availability, and continuous operation. You will learn how to assess risk mitigation strategies, redundancy planning, and the effectiveness of proactive monitoring. These areas are core to Domain …
…
continue reading

1
Episode 60: Conducting a Business Impact Analysis (BIA)
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of critical functions, and evaluate recovery time and recovery point objectives. CISA candidates must understand how to validate BIA results and tie them to continuity plans. Ready to start…
…
continue reading

1
Episode 59: Overview of Business Resilience
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recovery, redundancy, and failover. You will learn how to evaluate resilience strategies and how they relate to the audit objectives covered in Domain 4 and beyond. Ready to start your jour…
…
continue reading

1
Episode 58: Database Management Practices
11:19
11:19
Play later
Play later
Lists
Like
Liked
11:19Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures, configuration changes, and performance optimization. You will gain insight into how to audit database environments using the lens of confidentiality, integrity, and availability. Re…
…
continue reading
Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach handling, and vendor service reporting. These concepts are tested frequently in Domain 4, especially in questions that examine governance and performance alignment. Ready to start your j…
…
continue reading