The following 194 items are listed by Content Data.
Articles
Navigating Algorithmic Bias and Data Ethics in the Gig Economy: Balancing Transparency and Privacy
Examine the intersection of algorithmic bias and data ethics within gig platforms, focusing on three stakeholder groups:...
Articles
Head of Cyber at Crowdstrike on Emerging Risks, Identity Exploitation, Data Leaks and AI Wars
Explore how CEOs can make cybersecurity a competitive advantage rather than a cost center.
Audit Programs
Corporate Intranet Security Audit Work Program
Enhance corporate intranet security by focusing on access controls, secure coding practices and data protection measures...
Audit Programs
IT Data Management Audit Work Program
Identify, assess and strengthen IT data management controls for ensuring data security, integrity and regulatory complia...
Risk & Control Matrices - RCMs
Manage Information Technology Risk Control Matrix (RCM)
Identify and assess common IT risks, such as unauthorized data access, with this RCM sample.
Subscriber Content
Policies & Procedures
Code of Conduct Policy
Establish a framework for ethical decision-making and compliance with laws and company standards.
Blog
New Content on KnowledgeLeader - 10/13/2025
ToolsThe following tools were published on KnowledgeLeader this week:Employee Expense PolicyThis Emplo...
Audit Programs
PCI Review Audit Work Program
Achieve PCI DSS compliance by implementing secure data practices, conducting evidence-based reviews and protecting cardh...
Benchmarking Reports
2025 Finance Trends Survey Report
Protiviti’s latest Global Finance Trends Report explains how CFOs can best support and position the enterprise to respon...
Blog
New Content on KnowledgeLeader - 10/6/2025
ToolsThe following tools were published on KnowledgeLeader this week:Code of Conduct QuestionnaireStre...
Articles
Enhanced Security for Healthcare Record Monitoring Using Deep Learning in a Cloud Environment
Explore an effective deep learning model-based real-time Internet of Things (IoT) monitoring and prediction system.
Risk & Control Matrices - RCMs
Manage Data Center Operations: Security RCM
Uncover actionable risks and controls common to security and data center management in a risk control matrix (RCM) forma...
Subscriber Content