The following 881 items are listed by Content Data.
Guides
Sarbanes-Oxley Compliance and Disclosure Timeline Guide
This sample document can be used as a general guide to help companies comply with the Sarbanes-Oxley Act of 2002 pursuan...
Subscriber Content
Newsletters
The Metaverse: The Dawn of a New Generation of Capabilities
This issue of Board Perspectives explores how boards can wade into the shallow end of the metaverse investment pool rath...
Subscriber Content
Methodologies & Models
Treasury Risk Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s treasury risk management process...
Subscriber Content
Articles
Digital Expert Cheemin Bo-Linn Offers Executive Playbook for Web 3 and the Metaverse
Protiviti’s Joe Kornik and renowned business executive and entrepreneur Cheemin Bo-Linn offer an executive road map for ...
Subscriber Content
Guides
Enterprise Risk Management Guide: Identifying and Understanding Risks
Stay ahead of the curve and strengthen your business's risk management plan with the risk management solutions outlined ...
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 19
The new edition of Internal Auditing Around the World addresses how internal audit functions are increasing the relevanc...
Subscriber Content
Guides
Project Management Office Guide
This document contains three guides that provide an in-depth examination of the project management office's structure an...
Subscriber Content
Guides
Auditing the Enterprise Risk Management (ERM) Process Guide
In this tool, we’ve compiled a guide that includes a systematic, disciplined approach to evaluating and improving the ef...
Subscriber Content
Newsletters
What Role Should Compliance Play in ESG?
This edition of Compliance Insights highlights emerging ESG topics and explains how compliance officers can implement ef...
Subscriber Content
Articles
Defense Is the Best Offense: The Evolving Role of Cybersecurity Blue Teams and the Impact of Soar Technologies
This article accentuates the tactical implementation of cyber defense mechanisms to augment an organization’s capacity t...
Subscriber Content
Policies & Procedures
IT Third-Party Management Policy
Organizations can use the requirements included in this policy to manage the risks associated with vendor relationships.
Subscriber Content
Policies & Procedures
Account Reconciliation Policy
This tool contains multiple sample policies that establish procedures and guidelines organizations can use during their ...
Subscriber Content