The following 198 items are listed by Content Data.
Articles
The Rising Importance of Data Minimization in the Telecoms Industry
Telecom leaders must view data minimization through the lens of compliance risk management and recognize it as a strateg...
Policies & Procedures
Corporate Website Policy
Explore our Corporate Website Policy to safeguard your brand and user data effectively.
Audit Programs
Email Surveillance Audit Program
Ensure that email surveillance activities align with organizational objectives and regulatory requirements, identify gap...
Articles
The Future of Internal Audit: How to Master Adaptability
Audit Analytics explores the changing landscape of auditing, highlights essential adaptability skills, and provides acti...
Articles
Protect Your Cloud Environment With CNAPP
Cloud-native application-protection platforms (CNAPPs) unify security and compliance, proactively addressing misconfigur...
Articles
Cyberattacks on Schools – Steps Toward Resilience
Discover recommendations from governments and associated establishments to make the education sector more resilient to c...
Articles
Collaborative Security for Medical Devices – Best Practices for Device Manufacturers and Healthcare Delivery Organizations
Enhance patient care by securing medical devices through collaborative cybersecurity practices between manufacturers and...
Articles
Oracle Cloud Security: Preventing Unauthorized Access and Data Theft
How organizations can significantly enhance the security of their Oracle Cloud and protect themselves from potential dat...
Articles
Navigating the DOJ Final Rule on Bulk Sensitive Personal Data: What Does It Mean for Your Business?
Understand the DOJ final rule on bulk sensitive personal data, a directive under Executive Order 14117, setting strict c...
Subscriber Content
Blog
New Content on KnowledgeLeader - 5/19/2025
ToolsThe following tools were published on KnowledgeLeader this week:Risk Assessment and Internal Audi...
Articles
Former CISO on What Boards Are Getting Wrong About Data Protection and Privacy
The SEC’s cybersecurity disclosure rule sent shockwaves through the CISO ranks and created uncertainty for the future of...
Subscriber Content
Audit Programs
Security Policy Review Audit Work Program
Gain insights on the adequacy and effectiveness of your organization's IT and data security measures and strengthen them...
Subscriber Content