The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
Data Governance In Audit Podcasts
1
Auditing with data: for Performance Auditors and Internal Auditors that use (or want to use) data
Risk Insights, Yusuf Moolla, Conor McGarrity
The podcast for performance auditors and internal auditors that use (or want to use) data. Produced by Risk Insights.
…
continue reading
The podcast for Performance Auditors, that was hosted by Conor McGarrity and Yusuf Moolla. performanceaudit.substack.com
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
The AMaT podcast celebrates the work done by healthcare professionals to improve patient safety using clinical audit, quality improvement, compliance, and other governance processes. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
1
Algorithm Integrity Matters: for Financial Services leaders, to enhance fairness and accuracy in data processing
Risk Insights: Yusuf Moolla
Insights for financial services leaders who want to enhance fairness and accuracy in their use of data, algorithms, and AI. Each episode explores challenges and solutions related to algorithmic integrity, including discussions on navigating independent audits. The goal of this podcast is to give leaders the knowledge they need to ensure their data practices benefit customers and other stakeholders, reducing the potential for harm and upholding industry standards.
…
continue reading
Solving problems for small business owners, one drink at a time. We want you to get your life back from your business! From business planning, to making complicated tax concepts simple, to answering what software you should be using to the latest news in the world of business we cover it all!
…
continue reading
Welcome to The ESGmark® Podcast, where we hear from inspiring businesses committed to a sustainable future. Our host Chloë Clarke will be interviewing CEOs and business leaders about how and why they started, how they’ve grown and how ESG policies and values have shaped their journey.
…
continue reading
Environmental, social, and governance (ESG) news and investment research brought to you weekly covering major market trends and new research insights. With topics ranging from climate impact on investment portfolios, corporate actions, trending investment topics, and emerging ESG issues, host Mike Disabato of MSCI ESG Research walk through the latest news and research that is top of mind for MSCI ESG Research clients and partners. MSCI ESG Research products and services are provided by MSCI ...
…
continue reading
OUT-LAW Radio, a weekly broadcast covering news and developments in technology law
…
continue reading
This week Tim and Dan discuss the governments updates to the superannuation....again. We also discuss what big companies aren't and are paying tax. Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrunkaccountants/ Website: https://twodrunkaccountants.com.au Email: [email protected]…
…
continue reading
1
What Actually Works in OT Vulnerability Management with Dan Cartmill, TXOne Networks
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18In this episode of the Industrial Cybersecurity Insider, host Dino sits down with Dan Cartmill, Sr. Global Product Marketing Director for TXOne Networks, to discuss the often misunderstood world of OT vulnerability management. Dan brings a unique perspective, having started as a practitioner 17 years ago, before transitioning to the vendor side. Th…
…
continue reading
No episode this week as we take a quick break. Instead we update you on all of the exciting things coming up in the next 2 months!By Two Drunk Accountants
…
continue reading
1
Industrial Cybersecurity: The Gap Between Investment and Cyber Event Prevention
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54In this episode, Craig and Dino address why manufacturers still suffer incidents after spending millions on OT security tools. They discuss how to convert those investments into measurable risk reduction. You'll learn why buying tools isn't a strategy. Get insights into how to validate asset visibility on the floor (not just the network map), pract…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
1
How to Avoid Becoming Personally Liable for Company Tax Debt - Director Penalty Notices
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15This week we chat about director penalty notices and how to avoid them! With the ATO issuing more and more DPN's we discuss what they are and how to avoid becoming personally liable for your company's tax debts! Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrunkaccountants/ Website: https://tw…
…
continue reading
1
Hidden Cybersecurity Vulnerabilities in Today’s Data Centers
26:59
26:59
Play later
Play later
Lists
Like
Liked
26:59
…
continue reading
1
Your Most Valuable Investment - Your Time
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07This week Tim and Dan discuss your most important investment and that is your time. We recently attended a talk by Kate Christie about ways to save time, and you know we love a time-ass-tip, so discuss what we learned from this awesome session. Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrun…
…
continue reading
1
Building OT Cybersecurity That Works in the Real World
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46Industrial environments are complex. Aging systems, distributed plants, and a crowded vendor landscape make “buy another tool” a tempting but often costly reflex. In this episode, Dino Busalachi talks with Danielle “DJ” Jablanski, about moving from paper programs to measurable progress in OT security. They address why competence and capacity must c…
…
continue reading
1
5 Pieces of Data That Will Get you Audited
28:55
28:55
Play later
Play later
Lists
Like
Liked
28:55This week we discuss 5 pieces of the data that you will likely overlook that will greatly increase your risk of being reviews or audited by the ATO. Links: Youtube: https://www.youtube.com/@TwoDrunkAccountants Instagram: https://www.instagram.com/twodrunkaccountants/ Website: https://twodrunkaccountants.com.au Email: [email protected] ATO I…
…
continue reading
1
Mitsubishi’s Billion-Dollar Bet on OT Cybersecurity with Nozomi Acquisition
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29Hosts Craig and Dino discuss Mitsubishi's billion-dollar acquisition of Nozomi Networks and its implications for operational technology cybersecurity. They address how this major deal affects the industrial security market. The conversation covers IT/OT convergence challenges, managed services, vendor partnerships, and AI in cybersecurity decision-…
…
continue reading
This week we tackle another set of financial statements from an interesting point in time, Twitter circa 2021. Tim has seen them, Dan has not. Can he answer whats good, whats not good, what is the industry, what is the business and would he invest? Find out as we deep dive and analyse Twitters financials! Don't forget you can submit your anonymised…
…
continue reading
1
Responsibility Without Authority: The CISO's Industrial Cybersecurity Dilemma
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44In this episode, Craig and Dino address one of the most pressing challenges in industrial cybersecurity: the gap between responsibility and authority for CISOs and their ability to protect manufacturing and critical infrastructure plant floors. While executives are tasked with ensuring resilience and reporting to the board, they often hit resistanc…
…
continue reading
1
Xero's Big Updates, Parties and Chats with Angad Soin (MD Xero Australia and NZ)
47:09
47:09
Play later
Play later
Lists
Like
Liked
47:09This week we recap our time at Xerocon! We rehash the fun times and of course all the product announcements from Xero this year. We chat to Angad Soin Manage Director of Xero Australia and NZ and Chief Global Strategy Officer and debrief with friend of the pod Heather Smith!By Two Drunk Accountants
…
continue reading
1
The Critical Role of Local Knowledge in Industrial Cybersecurity
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25In this essential rewind episode, Dino Busalachi and Craig Duckworth address a fundamental challenge facing practitioners in the field: effectively securing operational technology (OT) environments through local expertise and proper data collection. The Power of Local Partnership Dino emphasizes a crucial principle that often gets overlooked in cyb…
…
continue reading
Lauren Hasson is the Founder of DevelopHer, an award-winning career development platform. In this podcast, she'll share a bit about her background and give a sneak peek at her upcoming CPE-eligible event.By ISACA Podcast
…
continue reading
1
FBI Alerts, OT Vulnerabilities, and What Comes Next
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05In this episode, Craig and Dino break down the FBI’s latest cybersecurity advisory and what it means for industrial organizations. From Cisco hardware vulnerabilities on the plant floor to the widening gap between IT and OT security teams, they address the critical blind spots that attackers often exploit. They discuss why manufacturing has become …
…
continue reading
1
What Progressive Firms do Different w. Liam Hindle
33:39
33:39
Play later
Play later
Lists
Like
Liked
33:39This week Dan is joined by Liam Hindle Head of Product Marketing at MYOB to discuss their Accounting Industry Monitor report. We discuss what they found the best firms were doing in areas like talent retention and tech/AI. Links: MYOB Accounting Industry Monitor Report - Here Website: https://twodrunkaccountants.com.au/ Instagram: https://www.insta…
…
continue reading
1
AI, Phishing, and the Future of Industrial Cyber Defense
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27In this week's rewind episode, Dino Busalachi is joined by Gary Kneeland from Claroty. With over nine years of experience at Claroty, Gary discusses the evolution of OT security, the convergence of IT and OT, and the growing importance of cybersecurity in protecting critical infrastructure. The conversation touches on how regulatory changes, ransom…
…
continue reading
1
How Can I Deduct My Home Loan Interest Against My Trust?
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23This week we go full clickbait and discuss how you can deduct your home loan interest. We cover the general mistakes peoples make when borrowing against their home for investments and the issue around lending this money to a discretionary trusts. We also discuss our hair for an extended period. Website: https://twodrunkaccountants.com.au/ Instagram…
…
continue reading
1
Partnership in Action: When Legacy Systems Meet Modern Cybersecurity Threats
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47In this hard-hitting episode of Industrial Cybersecurity Insider, host Dino Busalachi sits down with two battle-tested experts: Debbie Lay from TXOne Networks and Patrick Gillespie from GuidePoint Security. Together, they pull back the curtain on the messy, complex world of operational technology (OT) cybersecurity, where million-dollar cybersecuri…
…
continue reading
This week Tim and Dan discuss how we are currently using AI in our business and what we are finding it can and can't do. Website: https://twodrunkaccountants.com.au/ Youtube: https://www.youtube.com/@TwoDrunkAccountants Socials: @twodrunkaccountantsBy Two Drunk Accountants
…
continue reading
1
From Shelfware to Security: Operationalizing OT Industrial Cybersecurity Tools
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14Many manufacturing leaders believe they’re seeing 80–85% of their OT environment industrial assets. But in this episode, Dino and Craig reveal the reality that most have visibility into only 30–35% of their industrial control system assets, leaving the hidden 70% vulnerable. In this hard-hitting episode, they dismantle the false sense of OT securit…
…
continue reading
1
Tax Reform - Taxing Unrealised Gains and Options on the Table
41:47
41:47
Play later
Play later
Lists
Like
Liked
41:47This week Tim and Dan cover the updated superannuation laws taxing unrealised gains. We also discuss some other tax reform being discussed in the lead up to the Economic Reform Roundtable...which we have not been invited to. Website: https://twodrunkaccountants.com.au/ Email: [email protected] Insta: https://www.instagram.com/twodrunkaccoun…
…
continue reading
1
When the Plant Can't Stop: Securing Systems That Never Sleep
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18In this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, to explore what it really takes to secure complex industrial systems. Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the …
…
continue reading
1
TaxBusters - Can you Redirect Your Taxes to Pay Your Mortgage
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06This week Tim and Dan go full mythbusters style and discuss the viral videos doing the rounds about whether you can use your tax to pay down your mortgage. Will it be true? Will it be busted? Find out this week. Website: https://twodrunkaccountants.com.au/ Email: [email protected] Insta: https://www.instagram.com/twodrunkaccountants/ Youtub…
…
continue reading
1
The Lawyer's View: Strategic Lessons in Cybersecurity and Incident Response
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Craig Duckworth sits down with seasoned attorney and cyber crisis strategist Josh Cook, founder of Left of Boom Consulting. Together, they explore the pivotal role of proactive preparation in cybersecurity especially for mid-market and industrial organizations navigating today’s hyper-connected, AI-augmented threat landscape. Josh shares hard-earne…
…
continue reading
For episode 20 of The AMaT Podcast, Madalina Bleau and Craig Davidson discuss a project they ran which aimed to set standards for implementing NICE compliance. This episode's guests: Madalina Bleau is the NICE Implementation Manager for University Hospitals of Morecambe Bay. Craig Davidson is the Implementation Manager for NICE. Hosted on Acast. Se…
…
continue reading
1
Tips for Balancing a Family and a Business
43:13
43:13
Play later
Play later
Lists
Like
Liked
43:13This week Tim give his tips for running a small business and having a young family while Dan with no kids plays devils advocate. Sponsored: Accsouce - email [email protected] to receive 30 day free trial.By Two Drunk Accountants
…
continue reading
1
Plant-Level Cyber Risk: Who’s Actually Responsible?
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45In this episode, Dino Busalachi and Craig Duckworth tackle one of the most overlooked threats in cybersecurity: the number of industrial vendors and system integrators in manufacturing environments. The conversation addresses the relationship and communication gap between IT and the teams responsible for designing and supporting industrial control …
…
continue reading
This week Tim and Dan tackle a common questions when starting a family business, can I hire my spouse or kids? Can I distribute income to them?By Two Drunk Accountants
…
continue reading
1
The C-Suite's Role in Industrial Cybersecurity
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11In this episode, Craig Duckworth and Dino Busalachi discuss the critical role of the C-suite in fortifying manufacturing environments against cyber threats. They discuss the unique challenges that manufacturing organizations face. Their conversation reinforces the importance of executive teams understanding and actively engaging in industrial OT cy…
…
continue reading
This week Tim and Dan play another round of everyones favourite new game Show Us Ya Books! Can Tim guess the business correctly? Will he make a fool of himself? Do we wish we invested in this company? Find out!By Two Drunk Accountants
…
continue reading
1
Breaking Down the IT-OT Wall: Why IT Cybersecurity Tools Fail on the Plant Floor
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25In this episode, Dino Busalachi and Craig Duckworth tackle a critical disconnect plaguing industrial organizations: the disconnect in understanding and communication between IT and OT regarding industrial cybersecurity. While some IT departments are investing in OT cybersecurity platforms, 85% of the data these tools collect is designed for OT team…
…
continue reading
1
Episode 105: Evaluating Risks of Emerging Technologies and Practices
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evolving regulatory landscapes. You will learn how to audit control readiness, policy alignment, and adoption strategies—essential knowledge for CISA ques…
…
continue reading
1
Episode 104: Providing Guidance on Information Systems Quality Improvement
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhancements, and review post-audit actions. You will also explore how these contributions strengthen governance and demonstrate audit value on the CISA exam.…
…
continue reading
1
Episode 103: Evaluating Threat and Vulnerability Management
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candi…
…
continue reading
1
Episode 102: Evaluating Shadow IT Risks and Controls
11:01
11:01
Play later
Play later
Lists
Like
Liked
11:01Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently app…
…
continue reading
1
Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and data sanitization. These areas are tested in Domain 4 and require auditors to verify asset traceability, accountability, and risk mitigation. Ready to …
…
continue reading
1
Episode 100: Evaluating Privacy and Data Classification Programs
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling procedures. You will also learn how to assess program maturity and legal compliance, which are critical for high-scoring performance on the CISA exam. Rea…
…
continue reading
1
Episode 99: Evaluating Data Governance Program
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how auditors assess alignment with policies and regulatory requirements, making this a key episode for Domain 2 and Domain 5 exam success. Ready to start your …
…
continue reading
1
Episode 98: Evaluating IT Operations and Maintenance Practices
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management processes, and monitoring controls. The CISA exam frequently tests your ability to identify deficiencies in daily IT operations. Ready to start your jo…
…
continue reading
1
Episode 97: Evaluating Enterprise Architecture Alignment
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology standards, and decision-making roles. You will also explore how to audit EA for strategic alignment and integration with enterprise risk management. Ready …
…
continue reading
1
Episode 96: Evaluating End-User Support Processes
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training services. You will also learn how to evaluate whether support metrics align with service level expectations and risk management goals. Ready to start y…
…
continue reading
1
Episode 95: Evaluating Supply Chain Risk and Integrity Issues
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potential. You will also learn how to verify controls over third-party access and subcontractors, all of which are relevant for audit scenarios on the CISA ex…
…
continue reading
1
Episode 94: Evaluating IT Vendor Selection and Contract Management
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate procurement criteria, due diligence processes, contract terms, and ongoing monitoring practices. These concepts are frequently tested on the CISA exam in q…
…
continue reading
1
Episode 93: Evaluating IT Key Performance and Risk Indicators
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-making. You will learn how auditors validate metric accuracy, relevance, and consistency with business goals, all of which are crucial for mastering Do…
…
continue reading
1
Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation, and compliance with internal standards. Understanding ownership structure is a critical aspect of governance and frequently appears in CISA scenarios …
…
continue reading
1
Episode 91: Evaluating IT Resource and Project Management Alignment
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource allocation, project portfolio oversight, scheduling practices, and strategic alignment. You will also learn how to identify gaps in resource governance that …
…
continue reading
1
Episode 90: Evaluating IT Governance Effectiveness
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You will also explore the relationship between governance maturity and audit planning as emphasized in the CISA exam. Ready to start your journey with con…
…
continue reading