Cybersecurity

The following 112 items are listed by Content Data.
Articles

Will CrowdStrike Serve as a Reboot on Tech Resiliency?

How business leaders can use the CrowdStrike software update incident to prioritize recovery, communication and strategi...
Mon, Sep 9, 2024
Regulatory Updates

SEC Rebuked in SolarWinds Decision. What Does It Mean?

Discover the implications of the SEC’s setback in the SolarWinds decision and uncover insights on this landmark case aff...
Mon, Aug 26, 2024
Articles

Leveraging Artificial Intelligence (AI) in Public Sector Financial Risk Management: Innovations, Challenges and Future Directions

Explore the transformative role of artificial intelligence (AI) in enhancing financial risk management practices within ...
Mon, Aug 5, 2024
Policies & Procedures

Virus Protection Policy

Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Mon, Jul 22, 2024
Articles

A Survey of the Current and Emerging Ransomware Threat Landscape

Learn more about the history and evolution of ransomware and the current state of ransomware attacks, approaches and tar...
Mon, Jul 8, 2024
Articles

Digital Expert: Metadata and ID Keys to Unlocking E-Government

ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Mon, Jun 24, 2024
Articles

DORA Compliance: Untangling Key Hurdles to Implementation

How firms can respond to and apply Digital Operational Resilience Act requirements by the implementation date.
Mon, Jun 17, 2024
Articles

Building Your Toolkit for Quantifying Cyber Risk

A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Mon, Jun 10, 2024
Benchmarking Reports

SIFMA’s Quantum Dawn VII After-Action Report

The latest iteration of the biannual cybersecurity exercise, Quantum Dawn, focused on the outage of a critical third-par...
Mon, Jun 3, 2024
Articles

Former Cybersecurity Director: U.S. Navy Data Is the New Oil; We Need to Protect It

Protiviti’s Perry Keating and Former U.S. Navy Cybersecurity Director Kathleen Creighton discuss global threats, AI, the...
Mon, May 27, 2024
Policies & Procedures

Mobile Device Acceptable Use Policy

This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Mon, May 27, 2024
Articles

Sharpening the Board’s Focus on M&A Due Diligence

In this issue of Board Perspectives, we suggest the most important questions directors should ask during the due diligen...
Mon, May 27, 2024