Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » COBIT » ISACA

ISACA

ISACA is a global association serving IT governance professionals, risk managers, cybersecurity stakeholders, etc. Initially, it was called The Information Systems Audit and Control Association. ISACA was founded in 1969 and is a nonprofit organization offering IT knowledge and certification to about 140000 members across hundreds of business and government enterprises around the globe.

ISACA supports IT professionals in coping with the constant changes occurring and enhancing security and trust in information systems. They do this through certification, research, and networking with other entities in the association.

Another good way that the professionals can ensure they are updated on the trends in IT governance and cybersecurity is through membership in the ISACA community. To become a member of ISACA, you need to:

  • Have relevant experience in IT governance, risk management, or information security. Professional documents like your resume or CV must show your qualifications and demonstrate how you can contribute.
  • Visit the ISACA website, create an account, and complete the membership application form with accurate details.
  • Pay a nominal membership fee which may vary by location and membership type. So be sure to choose the option that best suits you.
  • Attach your supporting documents and submit them for review after completing the application.

The approval process can take a few weeks, but once you’re accepted, you’ll receive confirmation and officially become an ISACA member.

Additional reading

CISO strategies

CISO Strategies: The Playbook Of Top 1% CISOs

Recently, some attackers set up a crypto mining operation for the PurpleUrchin crypto mining campaign using the free or trial-based cloud computing services provided by platforms like GitHub, Heroku, and Togglebox. They create tens of thousands of fake accounts to bypass restrictions and exploit stolen or counterfeit credit cards to activate time-limited trials. And this…
DSPM Tools

Top 10 DSPM Tools to Uncover and Secure Your Data

Fragmented data discovery, visibility gaps, and the tedious process of manually classifying data can spell trouble in a world that produces data at an unprecedented pace. In fact, 90% of the world’s data was generated just between 2021 and 2023, and by 2025, it’s expected to soar to 181 zettabytes. It’s no wonder data security…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.