Cybersecurity

The following 108 items are listed by Content Data.
Articles

Cybersecurity and Fusion Centers

How organizations can better anticipate potential threats and implement proactive measures to protect their digital asse...
Subscriber Content
Mon, Jun 12, 2023
Newsletters

A Call for Transparency Amid a Shifting Legal and Regulatory Landscape

This issue of Board Perspectives explains how boards can shore up their governance and oversight in light of emerging tr...
Subscriber Content
Mon, May 29, 2023
Articles

Unleashing the Power of Mobile Threat-Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape

This article discusses the importance of mobile threat-hunting toolkits in modern cybersecurity, emphasizing their abili...
Subscriber Content
Mon, May 8, 2023
Articles

ISO 27001: 2022 – Key Changes and Approaches to Transition

A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Mon, Apr 3, 2023
Articles

Chair of Absa Group: For Workers, Offices and Operations, Flexibility Is Key to Future Success

Read this conversation between Protiviti’s Joe Kornik and Absa Group Chair Wendy Lucas-Bull about the future of workers,...
Subscriber Content
Mon, Feb 20, 2023
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Mon, Jul 4, 2022
Policies & Procedures

Virus Protection Policy

This tool contains four sample policies that define best-practice guidelines and procedures for protecting company compu...
Subscriber Content
Mon, May 16, 2022
Benchmarking Reports

2021 Finance Trends Survey Report: Consumer Products and Retail Industry Group

This report contains several key priorities for retail and CPG finance leaders to consider, based on the results from Pr...
Subscriber Content
Mon, Dec 20, 2021
Risk & Control Matrices - RCMs

Manage Security and Privacy: Manage Security Configurations RCM

This document outlines risks and controls common to managing security configurations during the security and privacy man...
Subscriber Content
Mon, Sep 27, 2021
Policies & Procedures

Information Security Management System Policy

This policy establishes the scope of a company's information security management system and characterizes the interfaces...
Subscriber Content
Mon, Sep 13, 2021
Articles

Realities of Crisis, Regulatory Landscape Call for Re-Imagining Resilience and Curbing Complacency

Here, we discuss several critical factors for financial services organizations to consider with regard to their future o...
Subscriber Content
Mon, Aug 9, 2021
Articles

Business Continuity Programs: Beware of Complacency

Protiviti Managing Director Matthew Watson outlines the looming danger of post-COVID complacency.
Subscriber Content
Mon, Jul 26, 2021