The following 111 items are listed by Content Data.
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
What Is Internal Audit’s Role in Cybersecurity?
Corporations are always thinking about how to protect assets. A few of the white-collar crimes companies mu...
Blog
What You Need to Know About GDPR Compliance
Are You Familiar with GDPR?
The General Data Protection Regulation (GDPR) became effective May 25, 2018, a...
Blog
Risks Associated with Data Integrity and Management Best Practices
Failure to manage data integrity risk can have the following impact:
Authorization, completeness, and ac...
Blog
What is Cloud Computing?
What is Cloud Computing?
Cloud computing is defined as the use of a collection of services, applications, ...
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Articles
Cybersecurity in the Technology Industry
In this white paper, Protiviti examines how technology firms assess the implementation of their cybersecurity programs a...
Subscriber Content
Articles
Why Organizations Should Consider a Cybersecurity Program Office
In this article, Protiviti Managing Directors Cal Slemp and Andrew Retrum explain how establishing a cybersecurity progr...
Subscriber Content
Benchmarking Reports
2019 Vendor Risk Management Benchmark Survey
Increasing pressures in the risk and regulatory environments continue to pose severe challenges to vendor risk managemen...
Subscriber Content
Articles
Enhancing Security Strategy for Cloud-Based Technology
This article includes strategies for addressing cloud risk; the importance of architectural decisions; next steps organi...
Subscriber Content
Benchmarking Reports
2019 Global RPA Survey
To help executives make the most of robotic process automation (RPA), Protiviti partnered with ESI ThoughtLab to survey ...
Subscriber Content
Articles
Armed with Artificial Intelligence, Hackers and the Guardians of IT Square Off on a New Digital Battleground
This article explores the virtual ‘‘battle of the bots’’ between cyber thugs and those tasked with blocking their invasi...
Subscriber Content