Privacy

The following 211 items are listed by Content Data.
Articles

Despite Slow Adoption, Companies Are Putting Artificial Intelligence on Fast Track, Protiviti Survey Finds

This article takes a closer look at the results of the 2018 Global AI and ML Survey, including which global segments are...
Subscriber Content
Mon, Jun 10, 2019
Articles

Credential Stuffing at Chipotle Mexican Grill Inc.

In this article, Audit Analytics discusses credential stuffing and offers suggestions on what companies can do to avoid ...
Subscriber Content
Mon, May 20, 2019
Articles

Leveraging Technology to Ensure Sustainability of Privacy

This article explores some of the considerations organizations are making to refine processes and become more efficient ...
Subscriber Content
Mon, May 20, 2019
Protiviti Booklets

FAQ: Understanding the General Data Protection Regulation

Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Mon, May 13, 2019
Audit Reports

ISO 27001 Information Security Assessment Report

This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Mon, May 6, 2019
Newsletters

Sharpening the Focus on Cybersecurity

This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Mon, Apr 1, 2019
Audit Reports

Security Policy and Procedure Evaluation Report: Data Security

This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Mon, Nov 26, 2018
Audit Programs

Vendor Review Audit Work Program

This sample provides steps for reviewing a company’s vendor management process.
Subscriber Content
Mon, Nov 19, 2018
Articles

Five Common Identity and Access Management Pitfalls

This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Mon, Oct 29, 2018
Articles

Integration Prioritization Model for Identity Access Management

Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Mon, Oct 29, 2018
Checklists & Questionnaires

Privacy and Data Protection Questionnaire

This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content
Mon, Oct 8, 2018
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018