The Road to ISACA 50
Follow along as we gear up for our 50th anniversary in 2019 and help us count down to the future!

By: Dario Sarlo | May 16, 2018

As technology has evolved over ISACA’s 50-year history, so has the threat landscape. What we now refer to as “cybersecurity” has taken different shapes and names over the decades.

In the 1970s and 1980s, enterprises often focused on physical security—protecting computer rooms and equipment. As information systems expanded and connected more people in the late ‘80s and ‘90s, security capabilities needed to grow to address new threats, including software piracy and hacking.

Along the way, ISACA provided professionals with tools for navigating the world of what came to be called cybersecurity, such as Cybersecurity Nexus (CSX), launched in 2014.

As we navigate the current environment of data breaches, ransomware attacks and new technologies such as artificial intelligence, and look to a future of continually-morphing threats, ISACA will keep providing the latest in cybersecurity best practices and tools.

Conference notes on a session led by Robert Parker on microcomputer security and control, from the 1986 Information Database newsletter from the New York Chapter
Advertisement for “Computer Security in America” survey report, from 1996 issue of The Password newsletter

Category: isaca50 

Tags: conferences, CSX, cybersecurity