The following 211 items are listed by Content Data.
Articles
Despite Slow Adoption, Companies Are Putting Artificial Intelligence on Fast Track, Protiviti Survey Finds
This article takes a closer look at the results of the 2018 Global AI and ML Survey, including which global segments are...
Subscriber Content
Articles
Credential Stuffing at Chipotle Mexican Grill Inc.
In this article, Audit Analytics discusses credential stuffing and offers suggestions on what companies can do to avoid ...
Subscriber Content
Articles
Leveraging Technology to Ensure Sustainability of Privacy
This article explores some of the considerations organizations are making to refine processes and become more efficient ...
Subscriber Content
Protiviti Booklets
FAQ: Understanding the General Data Protection Regulation
Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Audit Reports
ISO 27001 Information Security Assessment Report
This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Audit Programs
Vendor Review Audit Work Program
This sample provides steps for reviewing a company’s vendor management process.
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content