Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Data Governance In Audit Podcasts

show episodes
 
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
  continue reading
 
Artwork

4
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
The AMaT Podcast

Meantime AMaT Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The AMaT podcast celebrates the work done by healthcare professionals to improve patient safety using clinical audit, quality improvement, compliance, and other governance processes. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
Insights for financial services leaders who want to enhance fairness and accuracy in their use of data, algorithms, and AI. Each episode explores challenges and solutions related to algorithmic integrity, including discussions on navigating independent audits. The goal of this podcast is to give leaders the knowledge they need to ensure their data practices benefit customers and other stakeholders, reducing the potential for harm and upholding industry standards.
  continue reading
 
Artwork

1
Two Drunk Accountants

Two Drunk Accountants

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Solving problems for small business owners, one drink at a time. We want you to get your life back from your business! From business planning, to making complicated tax concepts simple, to answering what software you should be using to the latest news in the world of business we cover it all!
  continue reading
 
Artwork

1
ESG now

MSCI ESG Research LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Environmental, social, and governance (ESG) news and investment research brought to you weekly covering major market trends and new research insights. With topics ranging from climate impact on investment portfolios, corporate actions, trending investment topics, and emerging ESG issues, host Mike Disabato of MSCI ESG Research walk through the latest news and research that is top of mind for MSCI ESG Research clients and partners. MSCI ESG Research products and services are provided by MSCI ...
  continue reading
 
Loading …
show series
 
This week Tim and Dan discuss the governments updates to the superannuation....again. We also discuss what big companies aren't and are paying tax. Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrunkaccountants/ Website: https://twodrunkaccountants.com.au Email: [email protected]
  continue reading
 
In this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. Th…
  continue reading
 
In this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), pract…
  continue reading
 
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
  continue reading
 
This week we chat about director penalty notices and how to avoid them! With the ATO issuing more and more DPN's we discuss what they are and how to avoid becoming personally liable for your company's tax debts! Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrunkaccountants/ Website: https://tw…
  continue reading
 
This week Tim and Dan discuss your most important investment and that is your time. We recently attended a talk by Kate Christie about ways to save time, and you know we love a time-ass-tip, so discuss what we learned from this awesome session. Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrun…
  continue reading
 
Industrial environments are complex. Aging systems, distributed plants, and a crowded vendor landscape make “buy another tool” a tempting but often costly reflex. In this episode, Dino Busalachi talks with Danielle “DJ” Jablanski, about moving from paper programs to measurable progress in OT security. They address why competence and capacity must c…
  continue reading
 
This week we discuss 5 pieces of the data that you will likely overlook that will greatly increase your risk of being reviews or audited by the ATO. Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrunkaccountants/ Website: https://twodrunkaccountants.com.au Email: [email protected] ATO I…
  continue reading
 
Hosts Craig and Dino discuss Mitsubishi's billion-dollar acquisition of Nozomi Networks and its implications for operational technology cybersecurity. They address how this major deal affects the industrial security market. The conversation covers IT/OT convergence challenges, managed services, vendor partnerships, and AI in cybersecurity decision-…
  continue reading
 
This week we tackle another set of financial statements from an interesting point in time, Twitter circa 2021. Tim has seen them, Dan has not. Can he answer whats good, whats not good, what is the industry, what is the business and would he invest? Find out as we deep dive and analyse Twitters financials! Don't forget you can submit your anonymised…
  continue reading
 
In this episode, Craig and Dino address one of the most pressing challenges in industrial cybersecurity: the gap between responsibility and authority for CISOs and their ability to protect manufacturing and critical infrastructure plant floors. While executives are tasked with ensuring resilience and reporting to the board, they often hit resistanc…
  continue reading
 
This week we recap our time at Xerocon! We rehash the fun times and of course all the product announcements from Xero this year. We chat to Angad Soin Manage Director of Xero Australia and NZ and Chief Global Strategy Officer and debrief with friend of the pod Heather Smith!By Two Drunk Accountants
  continue reading
 
In this essential rewind episode, Dino Busalachi and Craig Duckworth address a fundamental challenge facing practitioners in the field: effectively securing operational technology (OT) environments through local expertise and proper data collection. The Power of Local Partnership Dino emphasizes a crucial principle that often gets overlooked in cyb…
  continue reading
 
In this episode, Craig and Dino break down the FBI’s latest cybersecurity advisory and what it means for industrial organizations. From Cisco hardware vulnerabilities on the plant floor to the widening gap between IT and OT security teams, they address the critical blind spots that attackers often exploit. They discuss why manufacturing has become …
  continue reading
 
This week Dan is joined by Liam Hindle Head of Product Marketing at MYOB to discuss their Accounting Industry Monitor report. We discuss what they found the best firms were doing in areas like talent retention and tech/AI. Links: MYOB Accounting Industry Monitor Report - Here Website: https://twodrunkaccountants.com.au/ Instagram: https://www.insta…
  continue reading
 
In this week's rewind episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. The conversation touches on how regulatory changes, ransom…
  continue reading
 
This week we go full clickbait and discuss how you can deduct your home loan interest. We cover the general mistakes peoples make when borrowing against their home for investments and the issue around lending this money to a discretionary trusts. We also discuss our hair for an extended period. Website: https://twodrunkaccountants.com.au/ Instagram…
  continue reading
 
In this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecuri…
  continue reading
 
Many manufacturing leaders believe they’re seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. In this hard-hitting episode, they dismantle the false sense of OT securit…
  continue reading
 
This week Tim and Dan cover the updated superannuation laws taxing unrealised gains. We also discuss some other tax reform being discussed in the lead up to the Economic Reform Roundtable...which we have not been invited to. Website: https://twodrunkaccountants.com.au/ Email: [email protected] Insta: https://www.instagram.com/twodrunkaccoun…
  continue reading
 
In this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, to explore what it really takes to secure complex industrial systems. Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the …
  continue reading
 
This week Tim and Dan go full mythbusters style and discuss the viral videos doing the rounds about whether you can use your tax to pay down your mortgage. Will it be true? Will it be busted? Find out this week. Website: https://twodrunkaccountants.com.au/ Email: [email protected] Insta: https://www.instagram.com/twodrunkaccountants/ Youtub…
  continue reading
 
Craig Duckworth sits down with seasoned attorney and cyber crisis strategist Josh Cook, founder of Left of Boom Consulting. Together, they explore the pivotal role of proactive preparation in cybersecurity especially for mid-market and industrial organizations navigating today’s hyper-connected, AI-augmented threat landscape. Josh shares hard-earne…
  continue reading
 
For episode 20 of The AMaT Podcast, Madalina Bleau and Craig Davidson discuss a project they ran which aimed to set standards for implementing NICE compliance. This episode's guests: Madalina Bleau is the NICE Implementation Manager for University Hospitals of Morecambe Bay. Craig Davidson is the Implementation Manager for NICE. Hosted on Acast. Se…
  continue reading
 
In this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments. The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control …
  continue reading
 
In this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cy…
  continue reading
 
In this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity. While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT team…
  continue reading
 
Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evolving regulatory landscapes. You will learn how to audit control readiness, policy alignment, and adoption strategies—essential knowledge for CISA ques…
  continue reading
 
Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhancements, and review post-audit actions. You will also explore how these contributions strengthen governance and demonstrate audit value on the CISA exam.…
  continue reading
 
Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candi…
  continue reading
 
Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently app…
  continue reading
 
IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and data sanitization. These areas are tested in Domain 4 and require auditors to verify asset traceability, accountability, and risk mitigation. Ready to …
  continue reading
 
Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling procedures. You will also learn how to assess program maturity and legal compliance, which are critical for high-scoring performance on the CISA exam. Rea…
  continue reading
 
Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how auditors assess alignment with policies and regulatory requirements, making this a key episode for Domain 2 and Domain 5 exam success. Ready to start your …
  continue reading
 
Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management processes, and monitoring controls. The CISA exam frequently tests your ability to identify deficiencies in daily IT operations. Ready to start your jo…
  continue reading
 
Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology standards, and decision-making roles. You will also explore how to audit EA for strategic alignment and integration with enterprise risk management. Ready …
  continue reading
 
Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training services. You will also learn how to evaluate whether support metrics align with service level expectations and risk management goals. Ready to start y…
  continue reading
 
Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potential. You will also learn how to verify controls over third-party access and subcontractors, all of which are relevant for audit scenarios on the CISA ex…
  continue reading
 
Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate procurement criteria, due diligence processes, contract terms, and ongoing monitoring practices. These concepts are frequently tested on the CISA exam in q…
  continue reading
 
Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-making. You will learn how auditors validate metric accuracy, relevance, and consistency with business goals, all of which are crucial for mastering Do…
  continue reading
 
Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation, and compliance with internal standards. Understanding ownership structure is a critical aspect of governance and frequently appears in CISA scenarios …
  continue reading
 
To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource allocation, project portfolio oversight, scheduling practices, and strategic alignment. You will also learn how to identify gaps in resource governance that …
  continue reading
 
Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You will also explore the relationship between governance maturity and audit planning as emphasized in the CISA exam. Ready to start your journey with con…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play