The following 149 items are listed by Content Data.
Benchmarking Reports
2021 Finance Trends Survey Report: Consumer Products and Retail Industry Group
This report contains several key priorities for retail and CPG finance leaders to consider, based on the results from Pr...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy: Manage Security Configurations RCM
This document outlines risks and controls common to managing security configurations during the security and privacy man...
Subscriber Content
Policies & Procedures
Network Access Control Devices Policy
The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Articles
Tech Can Help Oil and Gas Firms Survive Market Turmoil
Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
What You Need to Know About GDPR Compliance
Are You Familiar With GDPR?The General Data Protection Regulation (GDPR) became effective May 25, 2018, and...
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Blog
What is Cloud Computing?
What is Cloud Computing?Cloud computing is defined as the use of a collection of services, applications, in...
Newsletters
The Cyber Risk Oversight Challenge
Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Newsletters
How Long Does It Take to Implement a Patch?
A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content