The following 210 items are listed by Content Data.
Policies & Procedures
Access Management Policy
In this Access Management Policy, we have included four sample documents that can help you ensure that access to all sys...
Regulatory Updates
White House Issues Executive Order to “Seize the Promise and Manage the Risks” of AI
This Flash Report summarizes the key directives in President Biden’s first executive order on artificial intelligence an...
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Benchmarking Reports
What Boards Need to Know About the CFO’s Changing Priorities
Five finance priorities boards should keep in mind as they engage with CFOs, according to the results of Protiviti’s 202...
Policies & Procedures
Acceptable Use Policy
This tool contains two sample policies that establish standards and procedures organizations should follow for governing...
Articles
The Digital Currency Revolution Is Upon Us. Only the Global Economy Is at Stake
Governments are eager to position themselves for the next stage of the digital revolution in financial services by issui...
Articles
The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead
This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Articles
Former Schwab CEO Evelyn Dilsaver Talks AI, Crypto and Future of Financial Services
Protiviti’s Joe Kornik and former Schwab CEO Evelyn Dilsaver reflect on financial services of the past and look ahead at...
Benchmarking Reports
2023 Global Technology Executive Survey
Technology leaders are exploring new ways to drive innovation and maximize the value of IT in a changing world driven by...
Policies & Procedures
Confidentiality Policy
This tool includes three sample policies that define guidelines concerning confidential company information.
Articles
Metaverse 2030: Defining the “Next Internet” and Finding Ways for Businesses to Thrive in It
New metaverse threats — like invisible-avatar eavesdropping and the cloning of voice and facial features via avatars — w...
Policies & Procedures
Password Security Policy
Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...