The following 730 items are listed by Content Data.
Articles
Employee Awareness and Training
Cybersecurity success is achieved when an organization has secure systems and adequate monitoring and training for its e...
Subscriber Content
Policies & Procedures
Instant Messaging Policy
This policy outlines a set of procedures for the proper use of instant messaging by company employees.
Subscriber Content
Guides
IT Security Awareness and Training Program Guide
We've designed this guide to help companies implement and strengthen security training and awareness.
Subscriber Content
Policies & Procedures
Financial Information to Third-Parties Policy
Use the procedures and best practices in this sample policy to improve your processes for disclosing company financial i...
Subscriber Content
Benchmarking Reports
A New Reality for CFOs – ESG Is the Top Priority
Explore how CFOs are navigating ESG compliance and reporting in this changing landscape, based on the results of Protivi...
Subscriber Content
Checklists & Questionnaires
Credit Card Fraud Risk Questionnaire
Focus on these questions to learn more about the organization’s management and monitoring of credit card fraud risk.
Subscriber Content
Policies & Procedures
Expenditure Approval Authorization Policy
Use the approval and authorization requirements included in this sample policy to commit company funds or assets.
Subscriber Content
Benchmarking Reports
2023 Finance Trends Survey Report
Protiviti’s latest Global Finance Trends Report highlights how CFOs are marshaling all of the talent, technology and dat...
Subscriber Content
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Subscriber Content
Guides
Importance of Project Audits Guide
We’ve compiled a guide that outlines sample work program fieldwork and administrative steps for your project audit proce...
Subscriber Content
Articles
Offense for Defense: The Art and Science of Cybersecurity Red Teaming
How organizations can make informed decisions to enhance their defenses against an increasingly complex and dynamic cybe...
Subscriber Content
Audit Reports
Risk Self-Assessment Survey Report
Identify improvements for your organization’s risk management infrastructure and capabilities with this audit report sam...
Subscriber Content