Data Security

The following 189 items are listed by Content Data.

Checklists & Questionnaires

Data Conversion Compliance Questionnaire

This questionnaire provides an outline for reviewing documentation associated with a data conversion. Sections of the qu...
Subscriber Content
Mon, Aug 19, 2019
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Protiviti Booklets

FAQ: Understanding the General Data Protection Regulation

Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Mon, May 13, 2019
Blog

What You Need to Know About GDPR Compliance

Are You Familiar With GDPR?The General Data Protection Regulation (GDPR) became effective May 25, 2018, and...
Fri, Apr 5, 2019
Newsletters

Sharpening the Focus on Cybersecurity

This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Mon, Apr 1, 2019
Blog

Intellectual Property: Risks You Need to Know

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Fri, Feb 22, 2019
Audit Reports

Security Policy and Procedure Evaluation Report: Application Development and Change Control

This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content
Mon, Dec 31, 2018
Audit Reports

Security Policy and Procedure Evaluation Report: Data Security

This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Mon, Nov 26, 2018
Audit Reports

Security Policy and Procedure Evaluation Report: Administrative Personnel

This report records the result of an evaluation of security policies and procedures. The sample illustrates administrati...
Subscriber Content
Mon, Nov 19, 2018
Articles

Five Common Identity and Access Management Pitfalls

This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Mon, Oct 29, 2018
Checklists & Questionnaires

Privacy and Data Protection Questionnaire

Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Mon, Oct 8, 2018
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018