Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » COBIT » ISACA

ISACA

ISACA is a global association serving IT governance professionals, risk managers, cybersecurity stakeholders, etc. Initially, it was called The Information Systems Audit and Control Association. ISACA was founded in 1969 and is a nonprofit organization offering IT knowledge and certification to about 140000 members across hundreds of business and government enterprises around the globe.

ISACA supports IT professionals in coping with the constant changes occurring and enhancing security and trust in information systems. They do this through certification, research, and networking with other entities in the association.

Another good way that the professionals can ensure they are updated on the trends in IT governance and cybersecurity is through membership in the ISACA community. To become a member of ISACA, you need to:

  • Have relevant experience in IT governance, risk management, or information security. Professional documents like your resume or CV must show your qualifications and demonstrate how you can contribute.
  • Visit the ISACA website, create an account, and complete the membership application form with accurate details.
  • Pay a nominal membership fee which may vary by location and membership type. So be sure to choose the option that best suits you.
  • Attach your supporting documents and submit them for review after completing the application.

The approval process can take a few weeks, but once you’re accepted, you’ll receive confirmation and officially become an ISACA member.

Additional reading

gdpr article 9

Simplifying Article 9 of GDPR – guide to processing special category data

Have you come across consent prompts for cookie collection while surfing the internet? That results from tightening data privacy regulations like Article 9 of GDPR, which push businesses to take privacy more seriously.  These regulations mandate businesses to offer more control to users over how their data gets used and make it easier for them…
Types of Security Models: All you need to know

Types of Security Models: All you need to know

Security models offer a blueprint for how security should be applied within organizations to ensure data confidentiality for both them and their consumers. In this article, we will take a deep dive into the security models and their various types. What are security models? Information security models are systems that specify which people should have…
Cyber insurance companies

Top 10 Cyber Insurance Companies

Cyber insurance offers much more than protection alone. It covers expenses for things like, legal and investigative services, crisis communication and even compensation for those affected. For some companies, the absence of this coverage has meant shutting operations completely following a breach. As global tensions rise, with various conflicts like Russia-Ukraine, Palestine-Israel, insurers are rethinking “acts of war”…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.