The following 147 items are listed by Content Data.
Articles
A Survey of the Current and Emerging Ransomware Threat Landscape
Learn more about the history and evolution of ransomware and the current state of ransomware attacks, approaches and tar...
Subscriber Content
Articles
Digital Expert: Metadata and ID Keys to Unlocking E-Government
ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Subscriber Content
Articles
DORA Compliance: Untangling Key Hurdles to Implementation
How firms can respond to and apply Digital Operational Resilience Act requirements by the implementation date.
Subscriber Content
Blog
New Content on KnowledgeLeader - 6/10/2024
ToolsThe following tools were published on KnowledgeLeader this week:Prepaid Expenses PolicyThis tool ...
Articles
Building Your Toolkit for Quantifying Cyber Risk
A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Subscriber Content
Benchmarking Reports
SIFMA’s Quantum Dawn VII After-Action Report
The latest iteration of the biannual cybersecurity exercise, Quantum Dawn, focused on the outage of a critical third-par...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Articles
Former Cybersecurity Director: U.S. Navy Data Is the New Oil; We Need to Protect It
Protiviti’s Perry Keating and Former U.S. Navy Cybersecurity Director Kathleen Creighton discuss global threats, AI, the...
Subscriber Content
Blog
New Content on KnowledgeLeader - 5/27/2024
ToolsThe following tools were published on KnowledgeLeader this week:IT Disaster Recovery Plan Assessm...
Blog
New Content on KnowledgeLeader - 5/20/2024
ToolsThe following tools were published on KnowledgeLeader this week:Accounts Receivable, Credit and C...
Articles
Cybersecurity Expert: The U.S. Is Facing Big Challenges
Expert analysis on U.S. readiness when it comes to cyber warfare with our adversaries.
Subscriber Content
Articles
Beyond Pass/Fail: Developing a Quantitative Framework for Cybersecurity Audits
This article highlights the consequences of unresolved vulnerabilities and the necessity of effective risk communication...
Subscriber Content