The following 735 items are listed by Content Data.
Policies & Procedures
IT Third-Party Management Policy
Organizations can use the requirements included in this policy to manage the risks associated with vendor relationships.
Subscriber Content
Blog
KnowledgeLeader's Top 10 Pages: Q2 2023
Download the top 10 most frequently accessed tools and publications on KnowledgeLeader in the second quarte...
Guides
Guide to Implementing a Self-Assessment Program
In this tool, we have included three guides that outline the best-practice elements and processes related to developing ...
Subscriber Content
Guides
Risk Assessment Facilitation Guide
This tool contains three guidance documents that can be used by auditors to facilitate a risk assessment workshop.
Subscriber Content
Articles
Three Essential Security Considerations for Your SAP S/4 Implementation
SAP S/4 implementation projects must have the right risk mitigation measures in place as the system goes live.
Subscriber Content
Guides
Enterprise Risk Management Project Plan Guide
This guide can be used during the planning phase of implementing ERM across an organization. It supports a phased implem...
Subscriber Content
Blog
Strategies to Prepare for an Intellectual Property Audit
Intellectual property (IP) audits help companies identify and organize their intellectual assets.There are ...
Blog
Expense Reporting: Best Practices for Corporations
Generating revenue is typically the number one goal of any business. However, as the famous adage goes, “It...
Blog
KnowledgeLeader's Top 10 Pages: May 2023
Download the top 10 most frequently accessed tools and publications on KnowledgeLeader in May.1. Entity-Lev...
Blog
KnowledgeLeader Tool Pack: Data Analytics CPE Courses
The explosion in the use of digital channels and the data they produce have caused a corresponding rise in ...
Blog
Strategic Risk: Management and Reporting
Business can't be done, and money can't be made without taking on risks. Risk is an inevitable fact of busi...
Policies & Procedures
IT Governance Policy
Use the established requirements in this policy to oversee information technology resources, achieve company business ob...
Subscriber Content