The following 112 items are listed by Content Data.
Articles
Will CrowdStrike Serve as a Reboot on Tech Resiliency?
How business leaders can use the CrowdStrike software update incident to prioritize recovery, communication and strategi...
Regulatory Updates
SEC Rebuked in SolarWinds Decision. What Does It Mean?
Discover the implications of the SEC’s setback in the SolarWinds decision and uncover insights on this landmark case aff...
Articles
Leveraging Artificial Intelligence (AI) in Public Sector Financial Risk Management: Innovations, Challenges and Future Directions
Explore the transformative role of artificial intelligence (AI) in enhancing financial risk management practices within ...
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Articles
A Survey of the Current and Emerging Ransomware Threat Landscape
Learn more about the history and evolution of ransomware and the current state of ransomware attacks, approaches and tar...
Articles
Digital Expert: Metadata and ID Keys to Unlocking E-Government
ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Articles
DORA Compliance: Untangling Key Hurdles to Implementation
How firms can respond to and apply Digital Operational Resilience Act requirements by the implementation date.
Articles
Building Your Toolkit for Quantifying Cyber Risk
A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Benchmarking Reports
SIFMA’s Quantum Dawn VII After-Action Report
The latest iteration of the biannual cybersecurity exercise, Quantum Dawn, focused on the outage of a critical third-par...
Articles
Former Cybersecurity Director: U.S. Navy Data Is the New Oil; We Need to Protect It
Protiviti’s Perry Keating and Former U.S. Navy Cybersecurity Director Kathleen Creighton discuss global threats, AI, the...
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Articles
Sharpening the Board’s Focus on M&A Due Diligence
In this issue of Board Perspectives, we suggest the most important questions directors should ask during the due diligen...