The following 198 items are listed by Content Data.
Policies & Procedures
Data Center Operations and Problem Management Policy
The objective of this document is to provide policy and procedure guidance for conducting major activities in a company'...
Subscriber Content
Guides
Business Intelligence Overview and Guide
This guide provides auditors with a comprehensive breakdown of the meaning, importance and drivers of business intellige...
Subscriber Content
Guides
Social Media Risks Guide
This document can be used as a guide for identifying and mitigating social media risks within an organization.
Subscriber Content
Blog
Safeguarding Sensitive Data: Proactive Measures Against Cyber Threats
Data Security and Internal ControlsIn today’s digital age, breaches in data security from cyberattacks have...
Policies & Procedures
Cellular Phone Policy
Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Articles
Robert Half Chief Digital Officer: Connecting and Collaborating Will Be Critical in 2035
Protiviti’s Joe Kornik sat down with Colin Mooney, chief digital officer at Robert Half, to talk about emerging technolo...
Subscriber Content
Articles
Hong Kong CEO: Business With a Purpose — and Partnerships — Is the Future of ESG
The Mekong Club’s CEO believes that when it comes to business with a purpose, a company needs to do more than commit to ...
Subscriber Content
Guides
Data Migration Strategy Guide
This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Audit Reports
Internal Audit Strategic Vision Report
Auditors can use this audit report template to form an internal audit strategic plan and develop a road map to achieve t...
Subscriber Content
Blog
Making the Most of Your Internal Audit Practice
IntroductionIf you are reading this article, you are likely in the internal audit (IA) profession or lookin...
Blog
How IT Controls Enhance the Value of IT Assets
It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content