The following 218 items are listed by Content Data.
Risk & Control Matrices - RCMs
Manage Data Center Operations: Database Management RCM
This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Newsletters
The Board’s Role in the Transformation of Work
In this issue of Board Perspectives, we explore how boards and directors can facilitate a hybrid work model.
Subscriber Content
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Policies & Procedures
Data Center Security Policy
This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Articles
Protiviti-Oxford Survey: Executives Say Emerging Technologies Will Add Jobs Over the Next Decade
A staggering 88% of global business executives say AI will be key for a “radical transformation” of their company over t...
Subscriber Content
Performer Profiles
Standard Chartered: Creating an Organization That Is “Resilient by Design”
Standard Chartered Managing Director and Group Head of Audit Micky Bhansali explains how his team has progressed in its ...
Subscriber Content
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Articles
How Quantum Computing Will Impact the Future of Cities
Protiviti’s Joe Kornik and Konstantinos Karagiannis sat down to discuss the impact quantum computing could have on the f...
Subscriber Content
Data Analytics CPE Courses
Using Advanced Analytics to Move into Continuous Monitoring (KLplus CPE Course)
Learn how to leverage data and technology to understand the risks that are critical to the business.
Articles
Go! Mindblowing Mobility Driving Transportation’s Transformation
In this article, we discuss the future of urban mobility and the technologies that will disrupt transportation as we kno...
Subscriber Content
Policies & Procedures
Security Incident Policy
This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content