Cybersecurity

The following 149 items are listed by Content Data.

Performer Profiles

Bayer AG: Maintaining Relevance Through a “Big Picture” Lens

Axel Hamann, Bayer’s Head of Internal Audit and Risk Management, highlights his team’s proactive mindset toward identify...
Subscriber Content
Mon, Sep 4, 2023
Newsletters

Is Your Board Technology-Engaged?

This issue of Board Perspectives explains how boards can engage the CEO and management team in strategic conversations r...
Subscriber Content
Mon, Aug 28, 2023
Articles

Interweaving the Strands of AI and Soar Onto the Cybersecurity Mesh

This article explores the concept of “cybersecurity mesh” and how the integration of AI could transform this mesh into a...
Subscriber Content
Mon, Aug 14, 2023
Articles

View From Down Under: NSW’s Chief Data Scientist on Technology and the Future of Work

Artificial intelligence is increasingly good at doing mundane, repeatable tasks, but it’s moving up the value-creation s...
Subscriber Content
Mon, Jun 26, 2023
Articles

Three Essential Security Considerations for Your SAP S/4 Implementation

SAP S/4 implementation projects must have the right risk mitigation measures in place as the system goes live.
Subscriber Content
Mon, Jun 19, 2023
Newsletters

Modernizing Legacy Infrastructure to Increase Competitiveness: The Board’s Role

This issue of Board Perspectives explores how boards can increase agility and sustain the company’s innovation and trans...
Subscriber Content
Mon, Jun 19, 2023
Articles

Cybersecurity and Fusion Centers

Learn cybersecurity fundamentals to protect your business against threats and ensure a safe digital environment.
Subscriber Content
Mon, Jun 12, 2023
Newsletters

A Call for Transparency Amid a Shifting Legal and Regulatory Landscape

This issue of Board Perspectives explains how boards can shore up their governance and oversight in light of emerging tr...
Subscriber Content
Mon, May 29, 2023
Articles

Unleashing the Power of Mobile Threat-Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape

This article discusses the importance of mobile threat-hunting toolkits in modern cybersecurity, emphasizing their abili...
Subscriber Content
Mon, May 8, 2023
Articles

ISO 27001: 2022 – Key Changes and Approaches to Transition

A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Mon, Apr 3, 2023
Articles

Chair of Absa Group: For Workers, Offices and Operations, Flexibility Is Key to Future Success

Read this conversation between Protiviti’s Joe Kornik and Absa Group Chair Wendy Lucas-Bull about the future of workers,...
Subscriber Content
Mon, Feb 20, 2023
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Mon, Jul 4, 2022