As technology has evolved over ISACA’s 50-year history, so has the threat landscape. What we now refer to as “cybersecurity” has taken different shapes and names over the decades.
In the 1970s and 1980s, enterprises often focused on physical security—protecting computer rooms and equipment. As information systems expanded and connected more people in the late ‘80s and ‘90s, security capabilities needed to grow to address new threats, including software piracy and hacking.
Along the way, ISACA provided professionals with tools for navigating the world of what came to be called cybersecurity, such as Cybersecurity Nexus (CSX), launched in 2014.
As we navigate the current environment of data breaches, ransomware attacks and new technologies such...