Blake Curtis is a global business risk and security engineer for Deloitte Global and a research scientist completing his Ph.D. in cybersecurity and risk management. Today he breaks down frameworks, governance, and governmental controls from the board level to the code level. ISACA's Lisa Villanueva then asks him about years of experience vs. years of exposure as he gives his solution for the industry skills gap. In addition, he gives us some history on ISACA and CISA. Press play now to get into it with Blake!
A note from the author: Blake Curtis
Blake is asking for listeners' assistance in completing his research by taking a quick survey. He is collecting responses from IT auditors; however, we also collect survey responses from IT professionals and cybersecurity practitioners. To learn more please read below.
Your Choice: Anonymity or Engagement
The participants' responses will remain anonymous. As a result, no one will be able to identify them or their answers. Additionally, no one will know whether they participated in the study unless they received a certificate of completion and decide to share it via social media or other media sources.
However, we strongly encourage each participant to share their certificate on LinkedIn and share the survey with other candidates. Their contributions will inform the scientific body of research and potentially influence equitable hiring decisions in the Governance, Risk, and Compliance (GRC), Cyber, and Audit professions.
Unlocking Strategic Value from a Bug Bounty Program
The Cyber Standard Podcast - Episode 1
Measuring Security Risk Against Dynamic Threats
Reflecting on 25 Years of Information Security Matters
A View into CTEM Exposure Management: Reducing your Attack Surface 3x
Improving Security while Enabling Market Access with CCF
Leveraging Agile Concepts for Neurodiverse Auditors
Minimizing Risk and Audit Requests
Issue Management Confidential: Tools and Best Practices for Improving IT Issue Management
Improving Security while Enabling Market Access with CCF
Scaling Your Threat Modeling Program
Secure your Supply Chain with an Effective Vendor Security Program
Cultivating Inspired Leaders with Kristi Hedges
Exploring the Benefits of Neurodiversity within Cybersecurity
Internal Audits That Create Stakeholder Value Adopting an Agile Mindset
Strategies for Avoiding Burnout
The Danger of Distraction in Augmented Reality
Managing Human Risk Requires More Than Just Awareness Training
Preparing for Interruptions, Disruptions and Emergence Events
IS Audit in Practice: Data Integrity On Demand
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon