The following 133 items are listed by Content Data.
Newsletters
Technology Risks and Controls: What You Need to Know
In this issue of The Bulletin, we focus on the relevance of IT risks and controls to a company’s meeting the internal co...
Subscriber Content
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...
Blog
Guide to Records Management
Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...
Blog
IT Risk Management Best Practices
Investments in IT security and risk management continue to be on the rise. The main reason is that there’s ...
Blog
New Content on KnowledgeLeader - 2/26/2024
ToolsThe following tools were published on KnowledgeLeader this week:Investment Income PolicyThis Inve...
Blog
New Content on KnowledgeLeader - 5/15/2023
ToolsThe following tools were published on KnowledgeLeader this week:IT Organization Audit Work Progra...
Blog
New Content on KnowledgeLeader - 5/8/2023
ToolsThe following tools were published on KnowledgeLeader this week:IT and Business Risk Alignment G...
Blog
The Three Components of a Successful Systems Design
What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Blog
Topic Spotlight: Risk Assessment
Browse our Risk Assessment Topic area for expert guidance, customizable tools and actionable best practices...
Blog
What Is IT Risk and How Should You Manage It?
What Is IT Risk?
Information technology (IT) risk is any potential threat to business data, critical syste...
Blog
What is Transaction Authenticity?
What Is Transaction Authenticity?
"Transaction authenticity" can be defined as the authentication of a par...