All Episodes
Displaying 1 - 20 of 91 in total
Welcome to the ISACA CGEIT Audio Course
If you’re responsible for how technology supports business outcomes, you already know the hard part is not choosing tools, it’s governing decisions. **Certified: The I...
Episode 90 — Essential Terms: Plain-Language CGEIT Glossary for Fast Executive Recall (Glossary)
This is the last episode. This episode delivers a plain-language glossary of essential CGEIT terms so you can recall definitions quickly and apply them to executive-le...
Episode 89 — Exam Acronyms: High-Yield Audio Reference for CGEIT Domains and Tasks (Glossary)
This episode provides a high-yield acronym reference designed for fast recognition and accurate interpretation during scenario questions, where missing a single term c...
Episode 88 — Exam-day tactics: calm two-pass questions and “best answer” governance logic (Exam)
This episode gives you exam-day tactics tailored to CGEIT-style scenario questions, where multiple answers sound plausible and the goal is to choose the one that best ...
Episode 87 — Align data governance to analytics and AI needs without losing control (1C1)
This episode explains how to align data governance to analytics and AI needs so the enterprise can increase insight and automation without losing control over privacy,...
Episode 86 — Prevent architecture drift by governing standards, patterns, and waivers consistently (1B5)
This episode focuses on preventing architecture drift, meaning the slow spread of inconsistent platforms, integration methods, and design choices that increase cost an...
Episode 85 — Handle “shadow IT” using governance, incentives, and service improvements (1B6)
This episode teaches you how to handle shadow IT using governance that addresses root causes, because simply banning unsanctioned tools often drives the behavior under...
Episode 84 — Manage exceptions and deviations without undermining governance credibility (1A1)
This episode explains how to manage exceptions and deviations in a way that preserves governance credibility, because uncontrolled exceptions are how standards quietly...
Episode 83 — Develop and communicate risk policies and standards people can follow (Task 38)
This episode focuses on developing and communicating risk policies and standards that people can actually follow, because governance fails when requirements are unclea...
Episode 82 — Align IT and information risk management with the enterprise ERM framework (Task 37)
This episode teaches you how to align IT and information risk management with the enterprise ERM framework so risk decisions are comparable across the business and esc...
Episode 81 — Align IT processes with legal and regulatory compliance objectives every time (Task 36)
This episode explains how to align IT processes with legal and regulatory compliance objectives so compliance is predictable and repeatable, not dependent on individua...
Episode 80 — Monitor and report adherence to risk policies and standards continuously (Task 35)
This episode explains how to monitor and report adherence to risk policies and standards continuously, because governance only works when it can detect drift early and...
Episode 79 — Establish comprehensive IT and information risk management programs enterprise-wide (Task 34)
This episode focuses on establishing comprehensive IT and information risk management programs that operate enterprise-wide, meaning they are consistent across busines...
Episode 78 — Apply practical risk assessment methods that support real decisions (4B4)
This episode teaches you how to apply practical risk assessment methods that support real decisions, rather than producing reports that look rigorous but don’t change ...
Episode 77 — Run the risk management lifecycle from identification to monitoring and response (4B3)
This episode explains the risk management lifecycle as a repeatable governance loop that moves from identification to assessment, treatment decisions, implementation, ...
Episode 76 — Identify business risk, exposures, and threats with clarity and shared language (4B2)
This episode teaches you how to identify business risk, exposures, and threats using clear, shared language that enables executives and technical teams to align quickl...
Episode 75 — Govern risk across IT-enabled capabilities, processes, and services end-to-end (4B1)
This episode focuses on governing risk end-to-end across IT-enabled capabilities, processes, and services, because risk does not respect org charts and often emerges i...
Episode 74 — Set risk appetite and tolerance that leaders will enforce consistently (4A3)
This episode teaches you how to set risk appetite and tolerance in a way leaders can enforce consistently, which is critical because many governance failures come from...
Episode 73 — Integrate IT risk governance into enterprise risk management without friction (4A2)
This episode explains how to integrate IT risk governance into enterprise risk management so risk is evaluated consistently, escalations work smoothly, and leadership ...
Episode 72 — Select risk frameworks and standards that fit enterprise complexity and maturity (4A1)
This episode teaches you how to select risk frameworks and standards that fit the enterprise’s complexity, regulatory reality, and governance maturity, because choosin...