The following 196 items are listed by Content Data.
Policies & Procedures
Intranet and Internet Security Policy
This tool contains two sample policies that outline guidelines for a company's internet and intranet security.
Policies & Procedures
IT Data Management Policy
Our IT Data Management Policy outlines guidelines to ensure that critical data stored in applications and on servers is ...
Articles
Cornell Professor of Trade Policy: Digital Revolution Will Transform Currencies — and the World
Cornell Professor Eswar Prasad sat down with Protiviti’s Joe Kornik to discuss the digital revolution and the future of ...
Audit Programs
PCI Review Audit Work Program
This audit program can be used by organizations to process PINs, create cryptographic keys and administer secure keys.
Articles
Philosophical Dimensions of Information and Ethics in the Internet of Things (IoT) Technology
This article discusses the techno-philosophical aspects of IoT technology, covering the aspects of attention, subjectivi...
Articles
Aiming for Impact, Ripple CBDC Lead Says Proliferation of Digital Currencies Not to Be Feared
Ripple CBCD Senior Director of Client Solutions and Delivery Ross Edwards and Protiviti’s Lata Varghese discuss technolo...
Articles
Dwolla CEO: Open Banking, Embedded Finance to Transform the User Experience
Dwolla CEO Dave Glaser and Protiviti’s Nathan Hilt discuss how emerging technologies and the new infrastructure that eme...
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Benchmarking Reports
TMT Finance Leaders Cite ESG, Inflation and Data Security Among Top Priorities
The top risks TMT finance leaders should keep in mind moving forward, according to the results of Protiviti’s 2023 Finan...
Policies & Procedures
Access Management Policy
In this Access Management Policy, we have included four sample documents that can help you ensure that access to all sys...
Articles
Success With Generative AI Requires Balancing Risk With Reward
With generative AI, it all comes down to finding the right balance between risk and reward to uncover the benefits the t...