The following 149 items are listed by Content Data.
Articles
Will CrowdStrike Serve as a Reboot on Tech Resiliency?
How business leaders can use the CrowdStrike software update incident to prioritize recovery, communication and strategi...
Subscriber Content
Regulatory Updates
SEC Rebuked in SolarWinds Decision. What Does It Mean?
Discover the implications of the SEC’s setback in the SolarWinds decision and uncover insights on this landmark case aff...
Subscriber Content
Articles
Leveraging Artificial Intelligence (AI) in Public Sector Financial Risk Management: Innovations, Challenges and Future Directions
Explore the transformative role of artificial intelligence (AI) in enhancing financial risk management practices within ...
Subscriber Content
Blog
New Content on KnowledgeLeader - 7/22/2024
ToolsThe following tools were published on KnowledgeLeader this week:Process and Controls Change Manag...
Articles
A Survey of the Current and Emerging Ransomware Threat Landscape
Learn more about the history and evolution of ransomware and the current state of ransomware attacks, approaches and tar...
Subscriber Content
Articles
Digital Expert: Metadata and ID Keys to Unlocking E-Government
ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Subscriber Content
Articles
DORA Compliance: Untangling Key Hurdles to Implementation
How firms can respond to and apply Digital Operational Resilience Act requirements by the implementation date.
Subscriber Content
Articles
Building Your Toolkit for Quantifying Cyber Risk
A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Subscriber Content
Blog
New Content on KnowledgeLeader - 6/10/2024
ToolsThe following tools were published on KnowledgeLeader this week:Prepaid Expenses PolicyThis tool ...
Benchmarking Reports
SIFMA’s Quantum Dawn VII After-Action Report
The latest iteration of the biannual cybersecurity exercise, Quantum Dawn, focused on the outage of a critical third-par...
Subscriber Content
Articles
Former Cybersecurity Director: U.S. Navy Data Is the New Oil; We Need to Protect It
Protiviti’s Perry Keating and Former U.S. Navy Cybersecurity Director Kathleen Creighton discuss global threats, AI, the...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content