Privacy

The following 218 items are listed by Content Data.
Risk & Control Matrices - RCMs

Manage Data Center Operations: Database Management RCM

This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Mon, Dec 12, 2022
Newsletters

The Board’s Role in the Transformation of Work

In this issue of Board Perspectives, we explore how boards and directors can facilitate a hybrid work model.
Subscriber Content
Mon, Oct 31, 2022
Policies & Procedures

Infrastructure Security Policy

Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Mon, Sep 26, 2022
Policies & Procedures

Data Center Security Policy

This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Mon, Aug 29, 2022
Articles

Protiviti-Oxford Survey: Executives Say Emerging Technologies Will Add Jobs Over the Next Decade

A staggering 88% of global business executives say AI will be key for a “radical transformation” of their company over t...
Subscriber Content
Mon, Aug 22, 2022
Performer Profiles

Standard Chartered: Creating an Organization That Is “Resilient by Design”

Standard Chartered Managing Director and Group Head of Audit Micky Bhansali explains how his team has progressed in its ...
Subscriber Content
Mon, Aug 22, 2022
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 15, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022
Articles

How Quantum Computing Will Impact the Future of Cities

Protiviti’s Joe Kornik and Konstantinos Karagiannis sat down to discuss the impact quantum computing could have on the f...
Subscriber Content
Mon, Aug 1, 2022
Data Analytics CPE Courses

Using Advanced Analytics to Move into Continuous Monitoring (KLplus CPE Course)

Learn how to leverage data and technology to understand the risks that are critical to the business.
Mon, Jul 25, 2022
Articles

Go! Mindblowing Mobility Driving Transportation’s Transformation

In this article, we discuss the future of urban mobility and the technologies that will disrupt transportation as we kno...
Subscriber Content
Mon, Jul 4, 2022
Policies & Procedures

Security Incident Policy

This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content
Mon, Jun 27, 2022