IT Security

The following 207 items are listed by Content Data.
Articles

CFOs Now Consider the Security and Privacy of Finance Data Their Top Priority

In this article, Protiviti Managing Director Dalton Curt explains how CFOs can better understand the key aspects of data...
Subscriber Content
Mon, Jan 27, 2020
Audit Programs

Email Surveillance Audit Program

This audit program sample provides general steps organizations can use to perform an email surveillance audit.
Subscriber Content
Mon, Jan 13, 2020
Articles

Report: UK Regulators Urged to Hold Firms and Individuals Accountable for “Unacceptable” Number of IT Failures

This article provides a list of questions that can be used to stimulate a discussion on operational resilience at the bo...
Subscriber Content
Mon, Jan 6, 2020
Articles

Responsible Privacy: Is the Board Doing Its Part? — Protiviti Whitepaper

This article provides an extended summary of the significant points made during a recent National Association of Corpora...
Subscriber Content
Mon, Nov 4, 2019
Benchmarking Reports

2019 IT Audit Benchmarking Survey

This report uncovers key findings from the 2019 Global IT Audit Benchmarking Study conducted by ISACA and Protiviti.
Subscriber Content
Mon, Oct 28, 2019
Newsletters

Responsible Privacy: Is the Board Doing Its Part?

This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content
Mon, Oct 28, 2019
Articles

Capitalizing on Predictive Maintenance (PdM) Benefits in Manufacturing

This article explores the operational and financial benefits of PdM and suggests ways an organization can deploy a PdM s...
Subscriber Content
Mon, Oct 7, 2019
Performer Profiles

Brinks Home Security: ‘‘Just Start’’ — Advancing and Refining a Next-Generation Audit Approach

In this profile, Brinks Home Security Senior Director of Internal Audit Lynne Howison discusses her department’s use of ...
Subscriber Content
Mon, Sep 16, 2019
Newsletters

PreView: Protiviti's View on Emerging Risks, July 2019

In this issue of PreView, we address selected cloud-related risks, such as vendor lock-in, legal holds and cloud vendor ...
Subscriber Content
Mon, Sep 2, 2019
Articles

Programs, Policies, Principles and People Can Move ‘‘Ethical AI’’ From a Nebulous Concept to a Meaningful Practice

This article describes four key areas organizations should consider for the ethical development and use of AI.
Subscriber Content
Mon, Sep 2, 2019
Performer Profiles

Anixter International Inc.: Wiring Up Business Transformation

In this profile, Anixter Senior Vice President, Internal Audit and Chief Audit Executive Ed Rogowski explains how he use...
Subscriber Content
Mon, Aug 26, 2019
Checklists & Questionnaires

IT Application Security Questionnaire

This sample questionnaire is designed to monitor and enhance an organization's IT application security process.
Subscriber Content
Mon, Aug 19, 2019