The following 177 items are listed by Content Data.
Articles
Finding and Dealing with Key Project Issues: A New Approach
This article includes a full checklist, solutions and data on the systems developed to better address project gaps.
Subscriber Content
Blog
New Content on KnowledgeLeader - 4/15/2024
ToolsThe following tools were published on KnowledgeLeader this week:Back-Office Process Optimization ...
Policies & Procedures
Inventory Policy
This Inventory Policy outlines guidelines and accounting policies to ensure that inventory is properly controlled and va...
Subscriber Content
Policies & Procedures
Enterprise Incident Response Policy
Organizations can use this policy sample to develop a consistent process for responding to and recovering from security ...
Subscriber Content
Regulatory Updates
NIST Releases Version 2.0 of Its Cybersecurity Framework (CSF): What This Means for Your Organization
Elevate your cybersecurity strategy with Protiviti’s insights on the latest updates for robust protection measures.
Subscriber Content
Performer Profiles
Hilton: Relevance as a Journey, Not a Destination
Misha Moylan, Hilton’s Vice President of Internal Audit and ERM, shares how his team’s levels of attrition and turnover ...
Subscriber Content
Methodologies & Models
Enterprise Architecture Capability Maturity Model (CMM)
Measure the maturity of your organization’s enterprise architectural structure process and move it toward the optimized ...
Subscriber Content
Performer Profiles
GSK: Sustaining Relevance Through Education and Adding Value
GSK Head of Audit and Assurance Helen Harlow explains how her team has invested in new technology and capabilities to ke...
Subscriber Content
Performer Profiles
Westpac Group: Refocusing for Relevance
Scott Kieran, Westpac Group’s Chief Audit Executive, discusses how his team has become a well-run, more technology-enabl...
Subscriber Content
Policies & Procedures
Inventory Valuation Policy
Ensure that your organization’s inventory is properly controlled and prevent losses or shortages with this sample valuat...
Subscriber Content
Articles
Offense for Defense: The Art and Science of Cybersecurity Red Teaming
How organizations can make informed decisions to enhance their defenses against an increasingly complex and dynamic cybe...
Subscriber Content
Articles
Principles for Data Recovery From a Severe Cyber Scenario
This white paper explores how firms and regulators can set appropriate risk-based expectations for testing, reporting, r...
Subscriber Content