ISACA
Abbreviation | ISACA |
---|---|
Formation | 1969 |
Type | 501(c)(6) |
23-7067291[1] | |
Purpose | To advance the pursuit of digital trust and the positive potential of technology. |
Headquarters | Schaumburg, Illinois |
Coordinates | 42°3′10.9794″N 88°2′11.9754″W / 42.053049833°N 88.036659833°W |
Region | Global |
Membership | 169,000 (as of Dec 2022) |
Official language | English |
Erik Prusch | |
John De Santis | |
Revenue | USD $100.36 million (2022) |
Expenses | USD $107.80 million (2022) |
Staff | 300+ (2022) |
Volunteers | 2,400 (2023) |
Website | www |
Formerly called | EDP Auditors Association |
[2][3][4] |
ISACA is an international professional association focused on IT (information technology) governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only.[1][5][6] ISACA currently offers 8 certification programs, as well as other micro-certificates.
History
[edit]ISACA originated in United States in 1967,[5] when a group of individuals working on auditing controls in computer systems started to become increasingly critical of the operations of their organizations. They identified a need for a centralized source of information and guidance in the field. In 1969, Stuart Tyrnauer, an employee of the (later) Douglas Aircraft Company, incorporated the group as the EDP Auditors Association (EDPAA).[7] Tyrnauer served as the body's founding chairman for the first three years. In 1976 the association formed an education foundation to undertake large-scale research efforts to expand the knowledge of and value accorded to the fields of governance and control of information technology.
The association became the Information Systems Audit and Control Association in 1994.[8]
By 2008[update] the organization had dropped its long title and branded itself as ISACA.[9]
In March 2016, ISACA bought the CMMI Institute, which is behind the Capability Maturity Model Integration.[10]
In January 2020, ISACA updated and refreshed its look and digital presence, introducing a new logo.[11]
Current status
[edit]ISACA currently serves more than 170,000 constituents (members and professionals holding ISACA certifications) in more than 180 countries.[12] The job titles of members are such as IS auditor, consultant, educator, IS security professional, regulator, chief information officer, chief information security officer and internal auditor. They work in nearly all industry categories. There is a network of ISACA chapters with more than 225 chapters established in over 180 countries. Chapters provide education, resource sharing, advocacy, networking and other benefits.[13]
Major publications
[edit]- COBIT ISACA Framework
- Frameworks, Standards and Models
- Information System Control Journal
- Insights and Expertise
- Audit Programs and tools
- Publications - over 200 professional publications and Guidance on Audit & Assurance, Emerging Technology, Governance, Information Security, Information Technology, Privacy, Risk. Some of the topics include:
- Artificial Intelligence
- Blockchain
- Certification Exam Prep Guides for CISA, CRISC, CISM, CGEIT, CDPSE, CET and several Certificate Courses
- Cloud Computing
- COBIT
- Compliance
- Cybersecurity
- Data Governance
- Data Science
- Internet of Things
- Network Infrastructure
- Software Development
- Threats and Controls
- Vendor Management
- Young Professionals
- White Papers - Over 200 white papers on a range of contemporary topics
- News and Trends
Certifications
[edit]- Certified Information Systems Auditor (CISA,1978)[14]
- Certified Information Security Manager (CISM, 2002)[14]
- Certified in the Governance of Enterprise IT (CGEIT, 2007)[14]
- Certified in Risk and Information Systems Control (CRISC, 2010)[14]
- Cybersecurity Practitioner Certification (CSX-P, 2015)[15]
- Certified Data Privacy Solutions Engineer (CDPSE, 2020)[16]
- Information Technology Certified Associate (ITCA, 2021)[17][18]
- Certified in Emerging Technology (CET, 2021)[19][20]
The CSX-P, ISACA's first cybersecurity certification, was introduced in the summer of 2015. It is one of the few certifications that require the individual to work in a live environment, with real problems, to obtain a certification. Specifically, the exam puts test takers in a live network with a real incident taking place. The student's efforts to respond to the incident and fix the problem results in the type of score awarded.[21]
Certificates
[edit]- IT Audit Fundamentals Certificate
- IT Risk Fundamentals Certificate
- Certificate of Cloud Auditing Knowledge
- Cybersecurity Audit Certificate
- Computing Fundamentals Certificate
- Networks and Infrastructure Fundamentals Certificate
- Cybersecurity Fundamentals Certificate
- Software Development Fundamentals Certificate
- Data Science Fundamentals Certificate
- Cloud Fundamentals Certificate
- Blockchain Fundamentals Certificate
- IoT Fundamentals Certificate
- Artificial Intelligence Fundamentals Certificate
- COBIT Design and Implementation
- Implementing the NIST Cybersecurity Framework Using COBIT 2019
- COBIT Foundation
- COBIT 5 Certificates
See also
[edit]- Information assurance
- Information Security
- Information security management system
- IT risk
- Risk IT Framework
- COBIT
- Committee of Sponsoring Organizations of the Treadway Commission (COSO)
- (ISC)²
- Information Systems Security Association
- List of international professional associations
- IAPP
References
[edit]- ^ a b "INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION INC Form 990 2015". ProPublica. 9 May 2013. Retrieved 19 September 2017.
- ^ "About us". About ISACA. ISACA. Retrieved 13 July 2020.
- ^ "ISACA's Annual Reports". Annual Report. ISACA. Retrieved 4 May 2022.
- ^ "Board of Directors". Board of Directors. ISACA. Retrieved 21 July 2020.
- ^ a b [1] Archived 2 October 2007 at the Wayback Machine
- ^ Vacca, John (2009). Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 600. ISBN 978-0-12-374354-1.
- ^ Katsikas, Sokratis K. (2000). "A Postgraduate Programme on Information and Communication Systems Security". In Qing, Sihan; Eloff, Jan H. P. (eds.). Information Security for Global Information Infrastructures. IFIP Advances in Information and Communication Technology. Vol. 47. Springer. p. 50. ISBN 9780792379140.
[...] the Information Systems Audit and Control Association (ISACA - formerly EDPAA) [...]
- ^ Gleim, Irvin N.; Hillison, William A.; Irwin, Grady M. (June 1995). Auditing & systems: objective questions and explanations. 1. Vol. 6 (6 ed.). Gainesville, Florida: Accounting Publications. p. 37. ISBN 9780917537745.
In 1994, the association changed its name to the Information Systems Audit and Control Association.
- ^ Verschoor, Curtis C. (2008). Audit Committee Essentials. John Wiley & Sons. p. 205. ISBN 9780470337073.
[...] ISACA - previously known as the Information Systems Audit and Control Association [...]
- ^ Loeb, Matt. "ISACA Acquires CMMI Institute". ISACA. Archived from the original on 8 November 2019. Retrieved 1 June 2017.
- ^ Samuelson, David. "New Look Marks a New Era for ISACA". ISACA. Retrieved 9 June 2020.
- ^ "History of ISACA". ISACA. Retrieved 9 June 2020.
- ^ "About Our Chapter – Isaca". Retrieved 8 December 2020.
- ^ a b c d https://www.isaca50.org/files/images/ISACA50_Story_Gallery_Making_the_Mark-Importance_of_Certifications_website%20version.pdf Archived 15 June 2020 at the Wayback Machine [bare URL PDF]
- ^ "CSX-P | Cybersecurity Practitioner".
- ^ "Certified Data Privacy Solutions Engineer".
- ^ "Shift Your Career into Higher and Higher Gear". Information Technology Certified Associate. ISACA. Retrieved 4 May 2021.
- ^ "New ISACA certification to help upskill IT professionals". Technology Decisions. Westwick-Farrow Pty Ltd. Retrieved 4 May 2021.
- ^ "Fast Track Your Career in Emerging Technology". Certified in Emerging Technology. ISACA. Retrieved 4 May 2021.
- ^ Barth, Bradley (21 April 2021). "New certification program trains cyber pros in cloud, IoT and other emerging tech". SC. CyberRisk Alliance, LLC. Retrieved 4 May 2021.
- ^ "ISACA is First to Combine Skills-based Cybersecurity Training with per". 16 April 2015.