The following 210 items are listed by Content Data.
Articles
Responsible Privacy: Is the Board Doing Its Part? — Protiviti Whitepaper
This article provides an extended summary of the significant points made during a recent National Association of Corpora...
Subscriber Content
Benchmarking Reports
2019 IT Audit Benchmarking Survey
This report uncovers key findings from the 2019 Global IT Audit Benchmarking Study conducted by ISACA and Protiviti.
Subscriber Content
Newsletters
Responsible Privacy: Is the Board Doing Its Part?
This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content
Articles
Capitalizing on Predictive Maintenance (PdM) Benefits in Manufacturing
This article explores the operational and financial benefits of PdM and suggests ways an organization can deploy a PdM s...
Subscriber Content
Performer Profiles
Brinks Home Security: ‘‘Just Start’’ — Advancing and Refining a Next-Generation Audit Approach
In this profile, Brinks Home Security Senior Director of Internal Audit Lynne Howison discusses her department’s use of ...
Subscriber Content
Newsletters
PreView: Protiviti's View on Emerging Risks, July 2019
In this issue of PreView, we address selected cloud-related risks, such as vendor lock-in, legal holds and cloud vendor ...
Subscriber Content
Articles
Programs, Policies, Principles and People Can Move ‘‘Ethical AI’’ From a Nebulous Concept to a Meaningful Practice
This article describes four key areas organizations should consider for the ethical development and use of AI.
Subscriber Content
Performer Profiles
Anixter International Inc.: Wiring Up Business Transformation
In this profile, Anixter Senior Vice President, Internal Audit and Chief Audit Executive Ed Rogowski explains how he use...
Subscriber Content
Checklists & Questionnaires
IT Application Security Questionnaire
This sample questionnaire is designed to monitor and enhance an organization's IT application security process.
Subscriber Content
Articles
Who Is Watching the Bots? Part One: RPA Governance
This article explains how robotic process automation (RPA) at scale requires good governance to enable success while hel...
Subscriber Content
Audit Reports
Security Policy and Procedures Evaluation Report: Controls and Responsibility
This sample audit report records the results of a security policies and procedures evaluation. The review illustrates se...
Subscriber Content
Articles
Identity and Access Management in Financial Services: Staying Ahead of the Curve
Here, Protiviti’s Carol Beaumier and Matthew Kotraba discuss security and privacy trends in financial services and sugge...
Subscriber Content