The following 47 items are listed by Content Data.
Articles
Enhancing Security Strategy for Cloud-Based Technology
This article includes strategies for addressing cloud risk; the importance of architectural decisions; next steps organi...
Subscriber Content
Articles
Why Organizations Should Consider a Cybersecurity Program Office
In this article, Protiviti Managing Directors Cal Slemp and Andrew Retrum explain how establishing a cybersecurity progr...
Subscriber Content
Articles
Cybersecurity in the Technology Industry
In this white paper, Protiviti examines how technology firms assess the implementation of their cybersecurity programs a...
Subscriber Content
Audit Reports
Cybersecurity Audit Report
This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Guides
Internal Audit’s Role in Cybersecurity Guide
This guide covers the definition of cybersecurity, types of threats and security methods, and internal audit’s role.
Subscriber Content
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
New Content on KnowledgeLeader - 5/8/2023
Tools
The following tools were published on KnowledgeLeader this week:
IT and Business Risk Alignme...
Blog
Risks Associated with Data Integrity and Management Best Practices
Failure to manage data integrity risk can have the following impact:
Authorization, completeness,...
Blog
What is Cloud Computing?
What is Cloud Computing?
Cloud computing is defined as the use of a collection of services, applications, ...
Blog
What Is Internal Audit’s Role in Cybersecurity?
Corporations are always thinking about how to protect assets. A few of the white-collar crimes compani...
Blog
What You Need to Know About GDPR Compliance
Are You Familiar With GDPR?
The General Data Protection Regulation (GDPR) became effective May 25, 2018, a...