The following 454 items are listed by Content Data.
Blog
KnowledgeLeader's Greatest Hits: December 2024
Download these popular KnowledgeLeader tools highlighted through the month of December. 1. IT Ven...
Newsletters
A Director’s Road Map for Effective AI Implementation
Discover how to strategically deploy AI to drive innovation, manage risks and unlock enterprise value.
Subscriber Content
Articles
Machine Learning-Based Intrusion Detection Systems for SDN: An Empirical Study Using KNIME
How machine learning models can improve the efficiency of software-defined networking and network intrusion detection sy...
Subscriber Content
Audit Reports
Risk-Based Auditing and Audit Rating System Audit Report
Improve your company’s audit rating system with the key findings and recommendations included in this audit report sampl...
Subscriber Content
Benchmarking Reports
2024 Technology, Media and Telecommunications Finance Priorities
Discover how TMT finance priorities are shifting toward AI, cost optimization and robust data security in the digital ag...
Subscriber Content
Articles
Establishing a Scalable AI Governance Framework
Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fosterin...
Subscriber Content
Articles
Technology-Modernization Projects Must Define and Deliver Tangible Value to Justify Investment
How organizations can unleash growth with technology modernization, lower costs and effectively meet regulatory requirem...
Subscriber Content
Articles
The Future of Internal Auditing: Gardener of Governance
This article outlines what the internal audit profession should focus on to become more relevant and impactful in the fu...
Subscriber Content
Articles
Findings From a SOX Compliance Poll of Audit and Finance Executives and Professionals
Notable findings from Protiviti and AuditBoard’s SOX innovation webinar and trends and recommended actions organizations...
Subscriber Content
Articles
The DoD Unveils the Cybersecurity Maturity Model Certification Program: A Primer for Defense Contractors
The DoD’s Cybersecurity Maturity Model Certification Program sets stringent compliance standards to protect sensitive da...
Subscriber Content
Blog
Disaster Recovery Best Practices
Disasters can strike at any moment. While the consequences can be unexpected, how you deal with these incid...
Articles
Human Factors Security Engineering: The Future of Cybersecurity Teams
How human factors principles – including cognition, perception, behavioral psychology, cognitive workloads and unconscio...
Subscriber Content