The following 192 items are listed by Content Data.
Audit Programs
IT Data Management Audit Work Program
Identify, assess and strengthen IT data management controls for ensuring data security, integrity and regulatory complia...
Risk & Control Matrices - RCMs
Manage Information Technology Risk Control Matrix (RCM)
Identify and assess common IT risks, such as unauthorized data access, with this RCM sample.
Subscriber Content
Policies & Procedures
Code of Conduct Policy
Establish a framework for ethical decision-making and compliance with laws and company standards.
Audit Programs
PCI Review Audit Work Program
Achieve PCI DSS compliance by implementing secure data practices, conducting evidence-based reviews and protecting cardh...
Blog
New Content on KnowledgeLeader - 10/13/2025
ToolsThe following tools were published on KnowledgeLeader this week:Employee Expense PolicyThis Emplo...
Benchmarking Reports
2025 Finance Trends Survey Report
Protiviti’s latest Global Finance Trends Report explains how CFOs can best support and position the enterprise to respon...
Blog
New Content on KnowledgeLeader - 10/6/2025
ToolsThe following tools were published on KnowledgeLeader this week:Code of Conduct QuestionnaireStre...
Articles
Enhanced Security for Healthcare Record Monitoring Using Deep Learning in a Cloud Environment
Explore an effective deep learning model-based real-time Internet of Things (IoT) monitoring and prediction system.
Risk & Control Matrices - RCMs
Manage Data Center Operations: Security RCM
Uncover actionable risks and controls common to security and data center management in a risk control matrix (RCM) forma...
Subscriber Content
Audit Programs
Active Directory Audit Work Program
Strengthen your active directory security with our audit work program that identifies vulnerabilities and opportunities ...
Blog
New Content on KnowledgeLeader - 9/29/2025
ToolsThe following tools were published on KnowledgeLeader this week:Manage Data Center Operations: Se...
Blog
New Content on KnowledgeLeader - 9/8/2025
ToolsThe following tools were published on KnowledgeLeader this week:Data Security PolicyOur Data Secu...