VOLUME 2, 2016
Journal
Columns
4
Information Security Matters: Weary
Willie’s Guide to Cyberrisk Management
Steven J. Ross, CISA, CISSP, MBCP
18
Auditing Agile—A Brave New World
( )
Chong Ee, CISA, CGEIT
46
A Nontraditional Approach to Prioritizing
and Justifying Cybersecurity Investments
Robert Putrus, CISM, CFE, CMC, PE, PMP
24
Essential Frameworks and Methodologies
to Maximize the Value of IT
Laurent Renard, CISA, CISM, CGEIT, CRISC,
COBIT Foundation, DevOps, GRCP, ITIL Expert,
Lean Six Sigma BB, MoP, MSP, P3O, PMI-ACP, PMI-PBA, PMP, PRINCE2, Resilia, Scrum
PSM-PSPO, TOGAF
Plus
6
The Network
George Quinlan, CISA
54
Crossword Puzzle
Myles Mellor
8
IS Audit Basics: Is There Such a Thing as
a Bad IS Auditor?, Part 2
Ed Gelbstein, Ph.D.
31
Optimizing Software Development
With Lean Value Chain Analysis
Vimal Mani, CISA, CICA, Six Sigma Black Belt
55
Help Source Q&A
Ganapathi Subramaniam
10
Information Ethics: Is Information
Technology Responsible for Corporate
Crises?
Vasant Raval, DBA, CISA, ACMA
34
Quick Fixes for Improving Cyberdefenses
Sanjiv Agarwala, CISA, CISM, CGEIT,
BS 25999/ISO 22301 LA, CISSP, ISO
27001:2013 LA, MBCI
57
CPE Quiz #165
Based on Volume 6, 2015
The Internet of Things
Prepared by Smita Totade, Ph.D., CISA, CISM,
CGEIT, CRISC
The ISACA ® Journal
seeks to enhance
the proficiency and
competitive advantage
of its international
readership by providing
managerial and
technical guidance from
experienced global
authors. The Journal’s
noncommercial,
peer-reviewed articles
focus on topics critical to
professionals involved
in IT audit, governance,
security and assurance.
Features
59
Standards, Guidelines, Tools
and Techniques
13
Book Review: Data Privacy for the
Smart Grid
Reviewed by A. Krista Kivisild, CISA, CA, CPA
37
Application Security Risk
Shubhamangala B. R. and Snehanshu Saha,
Ph.D.
S1- S4
ISACA Bookstore Supplement
14
Risk Management in Agile Projects
( )
Alan Moran, Ph.D., CRISC, CITP
Online-exclusive Features
Do not miss out on the Journal’s online-exclusive content. With new content weekly through feature articles and blogs, the Journal is more than a
static print publication. Use your unique member login credentials to access these articles at www.isaca.org/journal.
Journal authors are
now blogging at
www.isaca.org/journal/blog.
Visit the ISACA Journal
Author Blog to gain more
insight from colleagues and
to participate in the growing
ISACA community.
Read more from these
Journa l authors…
Online Features
The following is a sample of the upcoming features planned for March and April.
The Art of Data Visualization, Part 2
Ataraxia and Premeditation as Elements of
Auditing IS/IT Risk Management, Part 1
Karina Korpela, CISA, CISM, CISSP, PMP
Judgment in the Risk Analysis Process
Ed Gelbstein, Ph.D.
(Disponible también en español)
David Eduardo Acosta R., CISA, CISM, CRISC, BS
25999 LA, CCNA Security, CHFI Trainer, CISSP
Instructor, OPST, PCI QSA
Follow ISACA on Twitter: http://twitter.com/isacanews; Hashtag: #ISACA
Discuss topics in the ISACA Knowledge Center: www.isaca.org/knowledgecenter
Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial
Like ISACA on Facebook: www.facebook.com/ISACAHQ
3701 Algonquin Road, Suite 1010
Rolling Meadows, Illinois 60008 USA
Telephone + 1.847.253.1545
Fax + 1.847.253.1443
www.isaca.org