The following 454 items are listed by Content Data.
Articles
Data Monetization: Value Realization and Data Sharing
Unlock the potential of data monetization by leveraging big data and advanced analytics.
Subscriber Content
Articles
Does DeepSeek Disrupt Your AI Strategy? It Should
DeepSeek revolutionizes AI with its open-source model, challenging U.S. dominance and reshaping enterprise strategies.
Subscriber Content
Internal Audit CPE Courses
Implementing Aligned Assurance (KLplus CPE Course)
In this course, you'll learn how to implement an aligned assurance model to build a collective view of risk.
A Strategic Approach to Fraud
Understanding Fraud Risk TodayWhen it comes to fraud in today's business environment, companies face a prob...
Newsletters
Are Your Board Materials Highlighting What’s Really Important?
How organizations can enhance their board’s effectiveness with concise, strategic and relevant materials.
Subscriber Content
Blog
New Content on KnowledgeLeader - 3/10/2025
ToolsThe following tools were published on KnowledgeLeader this week:Check Distribution PolicyThe purp...
Blog
Topic Spotlight: Enterprise Risk Management
Download these enterprise risk management tools and publications and keep them handy to assist with yo...
Blog
KnowledgeLeader's Top 10 Pages: February 2025
Download the 10 most frequently viewed audit tools and publications on KnowledgeLeader in February.1. Proce...
Benchmarking Reports
Executive Perspectives on Top Risks for the Near- and Long-Term
Unravel the threads of risk uncertainty with Protiviti’s 13th annual Top Risks survey report, providing insights from ov...
Subscriber Content
Blog
Topic Spotlight: Disaster Recovery
Evaluate your company's crisis management process with the disaster recovery tools and best practices in th...
Articles
A Guide to the EU AI Act: Regulations, Compliance and Best Practices
How organizations can ensure compliance with the EU AI Act and manage artificial intelligence systems effectively.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy - Administer Security: IT Physical Security RCM
Manage and mitigate security and privacy risks in alignment with your organization's evolving operational needs.
Subscriber Content