The following 118 items are listed by Content Data.
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Articles
A Survey of the Current and Emerging Ransomware Threat Landscape
Learn more about the history and evolution of ransomware and the current state of ransomware attacks, approaches and tar...
Articles
Digital Expert: Metadata and ID Keys to Unlocking E-Government
ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Articles
DORA Compliance: Untangling Key Hurdles to Implementation
How firms can respond to and apply Digital Operational Resilience Act requirements by the implementation date.
Articles
Building Your Toolkit for Quantifying Cyber Risk
A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Benchmarking Reports
SIFMA’s Quantum Dawn VII After-Action Report
The latest iteration of the biannual cybersecurity exercise, Quantum Dawn, focused on the outage of a critical third-par...
Articles
Former Cybersecurity Director: U.S. Navy Data Is the New Oil; We Need to Protect It
Protiviti’s Perry Keating and Former U.S. Navy Cybersecurity Director Kathleen Creighton discuss global threats, AI, the...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Articles
Sharpening the Board’s Focus on M&A Due Diligence
In this issue of Board Perspectives, we suggest the most important questions directors should ask during the due diligen...
Subscriber Content
Articles
Cybersecurity Expert: The U.S. Is Facing Big Challenges
Expert analysis on U.S. readiness when it comes to cyber warfare with our adversaries.
Subscriber Content
Articles
Beyond Pass/Fail: Developing a Quantitative Framework for Cybersecurity Audits
This article highlights the consequences of unresolved vulnerabilities and the necessity of effective risk communication...
Subscriber Content
Newsletters
A Call to Action for Boards
In this issue of Board Perspectives, we reveal several important opportunities leaders can take to improve board governa...
Subscriber Content