The following 108 items are listed by Content Data.
Risk & Control Matrices - RCMs
Manage Security and Privacy: Manage Security Configurations RCM
This document outlines risks and controls common to managing security configurations during the security and privacy man...
Subscriber Content
Policies & Procedures
Information Security Management System Policy
This policy establishes the scope of a company's information security management system and characterizes the interfaces...
Subscriber Content
Articles
Realities of Crisis, Regulatory Landscape Call for Re-Imagining Resilience and Curbing Complacency
Here, we discuss several critical factors for financial services organizations to consider with regard to their future o...
Subscriber Content
Articles
Business Continuity Programs: Beware of Complacency
Protiviti Managing Director Matthew Watson outlines the looming danger of post-COVID complacency.
Subscriber Content
Policies & Procedures
Network Access Control Devices Policy
The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content
Articles
Importance of Internal Controls for Cybersecurity
Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Articles
Tech Can Help Oil and Gas Firms Survive Market Turmoil
Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Articles
2020 Trends in Cybersecurity Breach Disclosures
In this article, Audit Analytics analyzes the trends and statistics of public company cybersecurity disclosures over the...
Subscriber Content
Articles
Cybersecurity Should Be a High Priority for Media Companies Making Crisis Management Plans
This article highlights the scope of media companies’ past cybersecurity efforts and identifies a four-step action plan ...
Subscriber Content
Articles
Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation
This article expands on the key takeaways from the Women Leaders in Cyber Security discussion panel of chief information...
Subscriber Content