Skip to Main Content
Login
Contact Us
Subscribe
About Us
Topics
Tools
Publications
CPE Training
University Center
Search:
Search
Home >
Topics >
Identity and Access Management
Identity and Access Management
View All
Articles
Audit Programs
Audit Reports
Benchmarking Reports
Benchmarking Tools
Checklists & Questionnaires
Guides
Memos
Methodologies & Models
Newsletters
Performer Profiles
Policies & Procedures
Protiviti Booklets
Regulatory Updates
View by
Date
Title
All Items
Feb 08, 2021
-
System Software Development Policy
Feb 01, 2021
-
Big Data Audit Work Program: Data Security Management
Feb 01, 2021
-
Access Management Policy
Nov 09, 2020
-
Identity Management Tool Questionnaire
Aug 24, 2020
-
Social Engineering Audit Work Program
Aug 03, 2020
-
European Court of Justice Invalidates the EU-US Privacy Shield Framework
Jun 22, 2020
-
VoIP Audit Work Program
May 18, 2020
-
Data Governance Guide
Dec 02, 2019
-
Facility Access Controls Policy
Aug 26, 2019
-
Access Controls Capability Maturity Model (CMM)
Jul 15, 2019
-
Identity and Access Management in Financial Services: Staying Ahead of the Curve
May 13, 2019
-
FAQ: Understanding the General Data Protection Regulation
May 06, 2019
-
ISO 27001 Information Security Assessment Report
Mar 04, 2019
-
GDPR: Dealing With the Mandatory 72-Hour Breach Notification Requirement
Feb 25, 2019
-
GDPR: Here’s What’s Happened So Far
Feb 18, 2019
-
GDPR and How It Affects Third-Party/Vendor Handling of Personal and Employee Data
Jan 28, 2019
-
GDPR: Legitimate Interest vs. Consent
Jan 14, 2019
-
Companies Must Commit to Mastering the Basics to Strengthen Their Cybersecurity Posture
Nov 19, 2018
-
Vendor Review Audit Work Program
Oct 29, 2018
-
Integration Prioritization Model for Identity Access Management
Oct 29, 2018
-
Five Common Identity and Access Management Pitfalls
Sep 10, 2018
-
California Adopted a GDPR-like Privacy Law: What Does It Mean for You?
Aug 20, 2018
-
Security Advisory: Meltdown and Spectre – Processor Flaws Expose Networks to New Class of Vulnerabilities
Jul 09, 2018
-
Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics
Jul 09, 2018
-
Hunting for Hackers: Internal Audit’s Growing Role in Breach Detection
Results Per Page
10
25
50
100
All
Previous
1
2
Next
Get started on KnowledgeLeader for free!
Start a 30-day free trial
Connect With Us
About Us
Contact Us
Pricing
FAQ
Blog
Log in to KnowledgeLeader
Access AuditNet
©
Copyright Protiviti Inc. 2021. EOE All Rights Reserved
Site Map
Privacy Policy
Access Agreement