Data Security

The following 195 items are listed by Content Data.
Protiviti Booklets

FAQ: Understanding the General Data Protection Regulation

Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Mon, May 13, 2019
Articles

Next-Generation Internal Auditing: Addressing Risk in the Midst of Rapid Change

At the 2018 SIFMA Internal Audit Society Annual Conference, Protiviti sponsored a breakout session of future-minded inte...
Subscriber Content
Mon, Apr 29, 2019
Newsletters

Sharpening the Focus on Cybersecurity

This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Mon, Apr 1, 2019
Audit Reports

Security Policy and Procedure Evaluation Report: Data Security

This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Mon, Nov 26, 2018
Articles

Five Common Identity and Access Management Pitfalls

This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Mon, Oct 29, 2018
Checklists & Questionnaires

Privacy and Data Protection Questionnaire

This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content
Mon, Oct 8, 2018
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018
Audit Reports

Data Privacy Maturity Audit Report

This report provides findings from the data privacy maturity assessment at any given company.
Subscriber Content
Mon, Aug 6, 2018
Articles

Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics

Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Mon, Jul 9, 2018
Checklists & Questionnaires

System Privileges for Terminated Employees Checklist

This sample provides action steps to consider for protecting an organization’s critical systems and data and secure syst...
Subscriber Content
Mon, Jun 18, 2018
Checklists & Questionnaires

Self-Assessment Questionnaire: IT Security Remediation

This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Mon, Apr 30, 2018
Newsletters

The Cyber Risk Oversight Challenge

Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Mon, Apr 23, 2018