Privacy

The following 198 items are listed by Content Data.

Audit Reports

Identity Access Management Report

Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Subscriber Content
Mon, Dec 16, 2024
Articles

Confessions of an Ethical Hacker: “I Could Break Into Any Company, All It Takes Is Time”

What C-level executives and board members can do to protect their businesses from attacks and what cybersecurity looks l...
Subscriber Content
Mon, Dec 9, 2024
Articles

Understanding the Impact of the EU AI Act: A Primer for Financial Institutions

Navigate the EU AI Act’s impact on finance with our strategic guide to compliance and ethical AI use.
Subscriber Content
Mon, Dec 2, 2024
Articles

Establishing a Scalable AI Governance Framework

Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fosterin...
Subscriber Content
Mon, Dec 2, 2024
Articles

Due Diligence and Regulatory Update

Key due diligence dos and don’ts and AI’s role in M&A due diligence, its benefits and solutions to challenges, includ...
Subscriber Content
Mon, Nov 25, 2024
Articles

CPO or No? Protiviti’s Tom Moore on the Evolution of the Privacy Role and Its Uncertain Future

Customers want to collaborate with companies that they trust, and protecting an individual’s privacy leads to that trust...
Subscriber Content
Mon, Nov 18, 2024
Articles

The DoD Unveils the Cybersecurity Maturity Model Certification Program: A Primer for Defense Contractors

The DoD’s Cybersecurity Maturity Model Certification Program sets stringent compliance standards to protect sensitive da...
Subscriber Content
Mon, Nov 11, 2024
Articles

Best Practices for Building a Sustainable PCI DSS Compliance Program

A look at best practices for developing a sustainable PCI DSS compliance program and how robust governance, specialized ...
Subscriber Content
Mon, Nov 4, 2024
Policies & Procedures

IT System Access and Re-Certification Policy

Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Subscriber Content
Mon, Nov 4, 2024
Audit Programs

System Intrusion Audit Work Program

Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Subscriber Content
Mon, Oct 28, 2024
Articles

Data by Default: How AI Radically Changes the Data Privacy Landscape

How artificial intelligence raises the issue of data privacy and data ownership to a new level of importance, complexity...
Subscriber Content
Mon, Oct 28, 2024
Articles

Protecting Data and Minimizing Threats With Microsoft’s Sarah Armstrong-Smith

Microsoft’s chief security advisor for EMEA discusses cyber threats, data governance, AI as a gamechanger and more.
Subscriber Content
Mon, Oct 28, 2024