ISACA CareerLaser

ISACA

Career Opportunities
Zenith Insurance Company
Woodland Hills, California

Visit https://jobs.isaca.org/jobs/12906461/ to view the full article online.

 
Office of the County Auditor - Anne Arundel County
Annapolis, Maryland

Visit https://jobs.isaca.org/jobs/13029028 to view the full article online.

 
New York University
New York, New York

Visit https://jobs.isaca.org/jobs/13036129 to view the full article online.

 
Deloitte
Various Locations throughout the US

Visit https://jobs.isaca.org/jobs/12931309/ to view the full article online.

 
Land O' Lakes, Inc.
Arden Hills, Minnesota

Visit https://jobs.isaca.org/jobs/13025484 to view the full article online.

 
UPS Information Technology
Mahwah, New Jersey

Visit https://jobs.isaca.org/jobs/13001848 to view the full article online.

 
Navy Federal Credit Union
Vienna, Virginia

Visit https://jobs.isaca.org/jobs/13021732 to view the full article online.

 
School of Information Technology
Toronto, Ontario

Visit https://jobs.isaca.org/jobs/12852317 to view the full article online.

 
BJs Wholesale Club
Westborough, Massachusetts

Visit https://jobs.isaca.org/jobs/13053696 to view the full article online.

 
Market Watch
 
Industry Outlook
By Andrew Morrison, Dark Reading
While many business investments (such as sales volume or quality customer service) are easy to track, the high value of cybersecurity investment can be more difficult to demonstrate. Company executives want to see a positive return on investment (ROI), and services that prevent cyber hacking or data breaches (therefore essentially showing that nothing has happened) run into the wall of being unable to demonstrate value in a traditional sense. The answer: framing critical data in a way that can be quickly understood and processed.

Visit https://www.darkreading.com/cloud/to-prove-cybersecuritys-worth-create-a-cyber-balance-sheet/a/d-id/1336251 to view the full article online.

 
By Ashley Halsey, Infosecurity Magazine
Cloud data storage and constant online activity are standard practice for companies of all sizes in our modern age. Cyber threats continue to be a top concern, so having a solid information security policy is more important than ever. Giving your employees a specific protocol to follow will help ensure that your data remains safe. Here are a few simple steps to get started.

Visit https://www.infosecurity-magazine.com/opinions/howto-information-security-policy/ to view the full article online.

 
By Kate Rogers, CNBC
Currently, about 2.8 million cybersecurity professionals are in the field - about 4 million less than required for adequate defense of organizations, according to a recent study.
Companies are struggling to retain cybersecurity personnel - particularly as an increasing number of workers say they prefer to operate as contractors, rather than full-time staff.

Visit https://www.cnbc.com/2019/11/01/jobs-companies-need-cybersecurity-workers-as-attacks-intensify.html to view the full article online.

 
Upcoming Events
Your ISACA
Amid our 50thAnniversary, take a look at what was happening in the 2000s as we navigated Y2K, Sarbanes-Oxley, and introduced new certifications bit.ly/2oDiUDp
 
What are some of the main factors that create a workplace culture that can encourage women to stay with their organizations? Find out in the new #ISACA #podcast bit.ly/31ZhEsD