Home / Resources / ISACA Journal / Editorial Calendar
ISACA Journal Editorial Calendar 2024–2025
Volume 6, 2024 | November/December
Anticipating Disruptive Innovation
Dates
Author-Related Dates
*Drafts Due: 19 July 2024
**Articles Due: 19 August 2024
Advertising-Related Dates
Insertion Due: 20 September 2024
Art Due: 27 September 2024
Mail Date
1 November 2024
- Time for Quantum thought leadership? Quantumania as a trend when looking at the development of security and controls
- Potential for Quantum to synergize with AI
- Disruption involves compliance, enforcement
- External triggers—What to be aware of, what triggers are having impacts?
- Auditing emerging technology
- Opportunities and challenges of smart buildings and estates, smart everything; the Internet of behaviors (e.g., retail analytics, healthcare monitoring, smart cities)
- The impact, security and privacy concerns of 5G
- The roles of edge computing/fog computing in tech development, risk, security and privacy challenges
- The rise and risk of digital twins and their applications
- The dualism of disruptive and emerging technologies (i.e., the rewards/risk, ethical, privacy, security, governance challenges of cryptography/encryption, facial recognition technology, biometrics, Industry 4.0)
- Anticipating, identifying and managing shadow/rogue IT
Volume 1, 2025 | January/February
The Cyberthreat Horizon: Evolution and Defense
Dates
Author-Related Dates
*Drafts Due: 18 September 2024
**Articles Due: 18 October 2024
Advertising-Related Dates
Insertion Due: 20 November 2024
Art Due: 27 November 2024
Mail Date
2 January 2025
- Defending against and responding to ransomware attacks
- Rise in AI-driven cyberattacks, deepfakes, and enhanced phishing techniques
- Proliferation of intelligent malware
- Security by design and default
- Dangers associated with legacy systems
- Cyberwarfare
- Self-healing cybersecurity solutions
- Assumed breach and penetration testing techniques
- Challenges of leadership in an evolving threat landscape
- Auditing cybersecurity
- Development and execution of incident response plans
Volume 2, 2025 | March/April
Governance Gains: Fortifying the Digital Ecosystem
Dates
Author-Related Dates
*Drafts Due: 18 November 2024
**Articles Due: 18 December 2024
Advertising-Related Dates
Insertion Due: 19 January 2025
Art Due: 26 January 2025
Mail Date
1 March 2025
- Frameworks (COBIT, CMMI, DTEF, Risk IT, ITAF, NIST AI RMF, etc.)
- Mappings and interconnections between frameworks and standards
- Use cases of frameworks and standards
- Effective communication with the board and senior management
- Corporate structure and culture at both large and small organizations
- Path to becoming a CISO and the role of the CISO on the board
- Delivering value from technology investments
- Meeting stakeholder expectations, particularly regarding emerging technologies
- Governance architectures
- Duties and competencies of the board
- Governance of AI and other emerging technologies
Volume 3, 2025 | May/June
The Digital Dilemma: Balancing Innovation and Integrity
Dates
Author-Related Dates
*Drafts Due: 20 January 2025
**Articles Due: 20 February 2025
Advertising-Related Dates
Insertion Due: 21 March 2025
Art Due: 28 March 2025
Mail Date
1 May 2025
- Biotechnology and related ethical considerations
- Leveraging CMMI for faster and more effective innovation
- Sustainability, particularly related to AI and other emerging technologies
- Collective intelligence influencing user habits
- Impact of emerging technology on the workforce and job market
- Growing disparity in access to technology
- Accountability related to AI and other emerging technologies
- Safety and sustainability related to autonomous devices/vehicles
- Consumer privacy issues and balancing the value of data with privacy
- Environment, social, and governance (ESG) considerations
- ESG reporting software
- Trends in facial recognition technology, including regulatory and privacy issues
- Ethical leadership
Volume 4, 2025 | July/August
The Future of Digital-Physical Systems
Dates
Author-Related Dates
*Drafts Due: 14 March 2025
**Articles Due: 15 April 2025
Advertising-Related Dates
Insertion Due: 22 May 2025
Art Due: 29 May 2025
Mail Date
1 July 2025
- Increasing cyber-physical convergence
- Critical infrastructure risk and security considerations
- nformation technology/operational technology (IT/OT)
- Impact of cybersecurity and privacy in the manufacturing industry
- Digital trust across the supply chain
- Integrating supply chain processes using CMMI
- Remote/hybrid work environments and related security considerations
- Leveraging CMMI’s virtual domain for successful remote work
- Event cybersecurity management (e.g., at a large global event such as the Olympics)
- Physical security events, governance, and auditing
- Internet of Things (IoT) and edge device proliferation
- Digital twins as an attack surface
- Remote auditing
- Biometrics and surveillance use, risk, and auditing
Volume 5, 2025 | September/October
Compliance Conundrum
Dates
Author-Related Dates
*Drafts Due: 16 May 2025
**Articles Due: 17 June 2025
Advertising-Related Dates
Insertion Due: 23 July 2025
Art Due: 30 July 2025
Mail Date
3 September 2025
- Globalization and the regulatory landscape
- Regulatory changes and conflicts (CCPA, CMMC, GDPR, DORA, AI Act, India DPDP, etc.)
- Framework and regulatory integration and enablement using CMMI
- Enterprise risk management for global companies
- Data sovereignty in a connected world
- nternal policy governance and compliance
- Auditing in a global environment (compliance with myriad regulations, auditing across geographic boundaries)
- The cost of compliance
- Compliance risk and risk mitigation
- Relationship between digital trust and compliance
Volume 6, 2025 | November/December
Tomorrow's Tech, Today
Dates
Author-Related Dates
*Drafts Due: 18 July 2025
**Articles Due: 19 August 2025
Advertising-Related Dates
Insertion Due: 19 September 2025
Art Due: 26 September 2025
Mail Date
1 November 2025
- Rapid adoption of IoT and edge computing and related vulnerabilities and risk
- Post-quantum and quantum-resilient cryptography
- Designing and assessing quantum-safe solutions
- Quantum-resilient architecture
- Biometrics, hardware devices, and attribute-based authentication
- 5G/6G network vulnerabilities and safeguarding the future of connectivity
- Combating the limitations of legacy systems
- Privacy-enhancing technologies
- Blockchain risk and audit
- The role of audit in a rapidly evolving technical landscape