Data Security

The following 186 items are listed by Content Data.

Blog

New Content on KnowledgeLeader - 9/29/2025

ToolsThe following tools were published on KnowledgeLeader this week:Manage Data Center Operations: Se...
Mon, Sep 29, 2025
Risk & Control Matrices - RCMs

Manage Data Center Operations: Security RCM

Uncover actionable risks and controls common to security and data center management in a risk control matrix (RCM) forma...
Subscriber Content
Mon, Sep 29, 2025
Blog

New Content on KnowledgeLeader - 9/8/2025

ToolsThe following tools were published on KnowledgeLeader this week:Data Security PolicyOur Data Secu...
Mon, Sep 8, 2025
Blog

New Content on KnowledgeLeader - 9/15/2025

ToolsThe following tools were published on KnowledgeLeader this week:Family Medical Leave PolicyLearn ...
Mon, Aug 25, 2025
Audit Programs

Data Center Review Audit Work Program

Conduct a thorough review of your data center's security and environmental controls with our data center audit program.
Subscriber Content
Mon, Aug 4, 2025
Articles

The Rising Importance of Data Minimization in the Telecoms Industry

Telecom leaders must view data minimization through the lens of compliance risk management and recognize it as a strateg...
Subscriber Content
Mon, Jul 28, 2025
Audit Programs

Application Controls Audit Work Program

Enhance your audit processes with our sample Application Controls Audit Work Program, ensuring robust security and compl...
Subscriber Content
Mon, Jul 21, 2025
Audit Programs

Email Surveillance Audit Program

Ensure that email surveillance activities align with organizational objectives and regulatory requirements, identify gap...
Subscriber Content
Mon, Jun 30, 2025
Policies & Procedures

Credit Card Information Handling Policy

Establish best-practice procedures for securing and managing credit card data with our sample credit card data handling ...
Subscriber Content
Mon, Jun 23, 2025
Audit Programs

System Post-Implementation Audit Work Program

Assess system performance and compliance, ensure data integrity, and optimize security with this audit program sample.
Subscriber Content
Mon, Jun 23, 2025
Articles

Cyberattacks on Schools – Steps Toward Resilience

Discover recommendations from governments and associated establishments to make the education sector more resilient to c...
Subscriber Content
Mon, Jun 16, 2025
Articles

Oracle Cloud Security: Preventing Unauthorized Access and Data Theft

How organizations can significantly enhance the security of their Oracle Cloud and protect themselves from potential dat...
Subscriber Content
Mon, Jun 9, 2025