ISACA CareerLaser

ISACA

Career Opportunities
US - TX - Dallas, Requirements: A bachelor's degree in management information systems, business administration, ...

Visit http://jobs.isaca.org/jobs/7025935/it-audit-manager to view the full article online.

 
US - CA - Mountain View, Requirements: Information security experience Compliance experience IT operations experience Broad ...

Visit http://jobs.isaca.org/jobs/6971474/information-security-analyst to view the full article online.

 
US - MA - Boston, Knowledge/Skills Extensive knowledge and practical experience in the implementation of information security ...

Visit http://jobs.isaca.org/jobs/6984227/vp-director-of-information-security to view the full article online.

 
US - IL - Rolling Meadows, Requirements & Skills: Outstanding written and verbal communication skills Strong editorial ...

Visit http://jobs.isaca.org/jobs/6182620/certification-item-exam-development-manager to view the full article online.

 
US - IL - Rolling Meadows,  Bachelor's degree required Successful sales professional with highly developed account ...

Visit http://jobs.isaca.org/jobs/6269710/sponsorship-sales-manager to view the full article online.

 
US - IL - Rolling Meadows, Requirements & Skills: 5+ years of experience On Call 24/7 Microsoft Exchange 2007/2010, ...

Visit http://jobs.isaca.org/jobs/6291972/technical-support-manager to view the full article online.

 
Market Watch
Industry Outlook
By Rutrell Yasin, GCN
Software applications are easily exploitable by adversaries, because many organizations are not applying the proper measures and due diligence to discover and patch vulnerabilities, especially prior to use. Agencies must protect systems from both software vulnerabilities and unintended software processing that compromise availability, integrity and other security properties.

That’s the message government and industry representatives attempted to drive home at the recent CISQ IT Risk Management and Cybersecurity Summit held in Reston, Va., in conjunction with the Object Management Group’s Technical Meeting.

Visit http://gcn.com/articles/2015/04/08/cyber-resilience.aspx to view the full article online.

 
 
By Cornelius Rahn, Bloomberg News
A year after the vulnerability was made public, 74 percent of more than 1,600 Forbes Global 2000 companies examined haven’t fixed their servers and networks completely.

Visit http://www.dispatch.com/content/stories/business/2015/04/13/heartbleed-continues-to-haunt-companies.html to view the full article online.

 
Upcoming Events
Your ISACA
Simultaneous implementation of an integrated ISMS and a BCMS (membership required) http://bit.ly/1DZ7p33  #infosec #security
 
Reserve your spot for Europe's leading conference for audit, assurance, security & risk professionals today http://bit.ly/1DYHM2j #EuroCACS
 
Nine steps to assess #GEIT processes http://bit.ly/1EReFCm  #COBIT
 
#Cybersecurity job functions are attracting increased visibility. Learn more http://bit.ly/1JZz35k
 
Evaluating E-health #Governance Frameworks http://bit.ly/1KdDaLe
 

Join the ISACA.org conversations here: