Home / Resources / ISACA Journal / Editorial Calendar
ISACA Journal Editorial Calendar
Volume 2, 2025 | March/April
Governance Gains: Fortifying the Digital Ecosystem
Dates
Author-Related Dates
*Drafts Due: 18 November 2024
**Articles Due: 18 December 2024
Advertising-Related Dates
Insertion Due: 19 January 2025
Art Due: 26 January 2025
Mail Date
1 March 2025
- Frameworks (COBIT, CMMI, DTEF, Risk IT, ITAF, NIST AI RMF, etc.)
- Mappings and interconnections between frameworks and standards
- Use cases of frameworks and standards
- Effective communication with the board and senior management
- Corporate structure and culture at both large and small organizations
- Path to becoming a CISO and the role of the CISO on the board
- Delivering value from technology investments
- Meeting stakeholder expectations, particularly regarding emerging technologies
- Governance architectures
- Duties and competencies of the board
- Governance of AI and other emerging technologies
Volume 3, 2025 | May/June
The Digital Dilemma: Balancing Innovation and Integrity
Dates
Author-Related Dates
*Drafts Due: 20 January 2025
**Articles Due: 20 February 2025
Advertising-Related Dates
Insertion Due: 21 March 2025
Art Due: 28 March 2025
Mail Date
1 May 2025
- Biotechnology and related ethical considerations
- Leveraging CMMI for faster and more effective innovation
- Sustainability, particularly related to AI and other emerging technologies
- Collective intelligence influencing user habits
- Impact of emerging technology on the workforce and job market
- Growing disparity in access to technology
- Accountability related to AI and other emerging technologies
- Safety and sustainability related to autonomous devices/vehicles
- Consumer privacy issues and balancing the value of data with privacy
- Environment, social, and governance (ESG) considerations
- ESG reporting software
- Trends in facial recognition technology, including regulatory and privacy issues
- Ethical leadership
Volume 4, 2025 | July/August
The Future of Digital-Physical Systems
Dates
Author-Related Dates
*Drafts Due: 14 March 2025
**Articles Due: 15 April 2025
Advertising-Related Dates
Insertion Due: 22 May 2025
Art Due: 29 May 2025
Mail Date
1 July 2025
- Increasing cyber-physical convergence
- Critical infrastructure risk and security considerations
- nformation technology/operational technology (IT/OT)
- Impact of cybersecurity and privacy in the manufacturing industry
- Digital trust across the supply chain
- Integrating supply chain processes using CMMI
- Remote/hybrid work environments and related security considerations
- Leveraging CMMI’s virtual domain for successful remote work
- Event cybersecurity management (e.g., at a large global event such as the Olympics)
- Physical security events, governance, and auditing
- Internet of Things (IoT) and edge device proliferation
- Digital twins as an attack surface
- Remote auditing
- Biometrics and surveillance use, risk, and auditing
Volume 5, 2025 | September/October
Compliance Conundrum
Dates
Author-Related Dates
*Drafts Due: 16 May 2025
**Articles Due: 17 June 2025
Advertising-Related Dates
Insertion Due: 23 July 2025
Art Due: 30 July 2025
Mail Date
3 September 2025
- Globalization and the regulatory landscape
- Regulatory changes and conflicts (CCPA, CMMC, GDPR, DORA, AI Act, India DPDP, etc.)
- Framework and regulatory integration and enablement using CMMI
- Enterprise risk management for global companies
- Data sovereignty in a connected world
- nternal policy governance and compliance
- Auditing in a global environment (compliance with myriad regulations, auditing across geographic boundaries)
- The cost of compliance
- Compliance risk and risk mitigation
- Relationship between digital trust and compliance
Volume 6, 2025 | November/December
Tomorrow's Tech, Today
Dates
Author-Related Dates
*Drafts Due: 18 July 2025
**Articles Due: 19 August 2025
Advertising-Related Dates
Insertion Due: 19 September 2025
Art Due: 26 September 2025
Mail Date
1 November 2025
- Rapid adoption of IoT and edge computing and related vulnerabilities and risk
- Post-quantum and quantum-resilient cryptography
- Designing and assessing quantum-safe solutions
- Quantum-resilient architecture
- Biometrics, hardware devices, and attribute-based authentication
- 5G/6G network vulnerabilities and safeguarding the future of connectivity
- Combating the limitations of legacy systems
- Privacy-enhancing technologies
- Blockchain risk and audit
- The role of audit in a rapidly evolving technical landscape