The following 186 items are listed by Content Data.
Blog
What You Need to Know About GDPR Compliance
Are You Familiar With GDPR?The General Data Protection Regulation (GDPR) became effective May 25, 2018, and...
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Blog
Intellectual Property: Risks You Need to Know
Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Audit Reports
Security Policy and Procedure Evaluation Report: Application Development and Change Control
This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Administrative Personnel
This report records the result of an evaluation of security policies and procedures. The sample illustrates administrati...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Checklists & Questionnaires
Self-Assessment Questionnaire: IT Security Remediation
This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Newsletters
The Cyber Risk Oversight Challenge
Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Protiviti Booklets
U.S. Anti-Money Laundering Requirements
This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content