Search results: 17 matching results

New IT Security Awareness Learning Library Is Designed to Help Workers Become Frontline Cyber Defenders for Their Employers

Employee training can go a long way toward improving an organization’s overall security posture. With that in mind, Prot...
Subscriber Content

Feeling Benched? Four Ways to Become the Indispensable Auditor

As internal audit departments change in what they audit, the importance of who audits becomes a priority. Highly effecti...
Subscriber Content

Six Areas to Assess When Diagnosing Organizational Culture

In this article, popular KnowledgeLeader writer Ann Butera explores and defines six areas you should focus on when evalu...
Subscriber Content

Women in Cybersecurity: A Vital Subset of the Women in Tech Movement

Women have played and continue to play a remarkable role as inventors, programmers, problem-solvers and strategy-setters...
Subscriber Content

Preparing for the Acquisition Your CEO Hasn’t Announced Yet: Three Actions to Take Now

This article provides proven advice that can help a company avoid the detrimental effects of poor acquisition integratio...
Subscriber Content

Blog and Social Networking Policy

The purpose of this policy is to ensure that all employee blog and social networking activities incorporate consistent s...
Subscriber Content

Internal Company Knowledge Sharing Policy

This policy outlines a set of procedures governing knowledge sharing within a company by using a knowledge management (K...
Subscriber Content

Top Risks: Winning the War for Talent

This article shares strategies organizations should incorporate to up their recruiting game.
Subscriber Content

The Human(e) Side of Digital

This article looks at some current and historical digital transformation trends that provide key lessons for boards and ...
Subscriber Content

Focused on Digital Transformation? Lead With People, Not Technology

This article explains why humans continue to be an essential element of company advancement and identifies five key step...
Subscriber Content

Disclosure of Private Data Policy

This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content

Record Retention Policy

This tool contains two sample policies that establish standards and procedures for the retention of an organization’s el...
Subscriber Content

Apply Best Practices Across the Organization Key Performance Indicators (KPIs)

This tool defines leading practices and questions to consider related to implementing and maintaining best practices acr...
Subscriber Content

Benchmark Performance Key Performance Indicators (KPIs)

This tool outlines key performance indicators and process steps organizations should follow when benchmarking.
Subscriber Content

Process Alignment Risk Key Performance Indicators (KPIs)

This tool includes key performance indicators and questions an organization should use to organize and perform process a...
Subscriber Content