The following 198 items are listed by Content Data.
Audit Reports
Identity Access Management Report
Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Subscriber Content
Articles
Confessions of an Ethical Hacker: “I Could Break Into Any Company, All It Takes Is Time”
What C-level executives and board members can do to protect their businesses from attacks and what cybersecurity looks l...
Subscriber Content
Articles
Understanding the Impact of the EU AI Act: A Primer for Financial Institutions
Navigate the EU AI Act’s impact on finance with our strategic guide to compliance and ethical AI use.
Subscriber Content
Articles
Establishing a Scalable AI Governance Framework
Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fosterin...
Subscriber Content
Articles
Due Diligence and Regulatory Update
Key due diligence dos and don’ts and AI’s role in M&A due diligence, its benefits and solutions to challenges, includ...
Subscriber Content
Articles
CPO or No? Protiviti’s Tom Moore on the Evolution of the Privacy Role and Its Uncertain Future
Customers want to collaborate with companies that they trust, and protecting an individual’s privacy leads to that trust...
Subscriber Content
Articles
The DoD Unveils the Cybersecurity Maturity Model Certification Program: A Primer for Defense Contractors
The DoD’s Cybersecurity Maturity Model Certification Program sets stringent compliance standards to protect sensitive da...
Subscriber Content
Articles
Best Practices for Building a Sustainable PCI DSS Compliance Program
A look at best practices for developing a sustainable PCI DSS compliance program and how robust governance, specialized ...
Subscriber Content
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Subscriber Content
Audit Programs
System Intrusion Audit Work Program
Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Subscriber Content
Articles
Data by Default: How AI Radically Changes the Data Privacy Landscape
How artificial intelligence raises the issue of data privacy and data ownership to a new level of importance, complexity...
Subscriber Content
Articles
Protecting Data and Minimizing Threats With Microsoft’s Sarah Armstrong-Smith
Microsoft’s chief security advisor for EMEA discusses cyber threats, data governance, AI as a gamechanger and more.
Subscriber Content