Cybersecurity

The following 118 items are listed by Content Data.
Policies & Procedures

Virus Protection Policy

Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Mon, Jul 22, 2024
Articles

A Survey of the Current and Emerging Ransomware Threat Landscape

Learn more about the history and evolution of ransomware and the current state of ransomware attacks, approaches and tar...
Mon, Jul 8, 2024
Articles

Digital Expert: Metadata and ID Keys to Unlocking E-Government

ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Mon, Jun 24, 2024
Articles

DORA Compliance: Untangling Key Hurdles to Implementation

How firms can respond to and apply Digital Operational Resilience Act requirements by the implementation date.
Mon, Jun 17, 2024
Articles

Building Your Toolkit for Quantifying Cyber Risk

A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Mon, Jun 10, 2024
Benchmarking Reports

SIFMA’s Quantum Dawn VII After-Action Report

The latest iteration of the biannual cybersecurity exercise, Quantum Dawn, focused on the outage of a critical third-par...
Mon, Jun 3, 2024
Articles

Former Cybersecurity Director: U.S. Navy Data Is the New Oil; We Need to Protect It

Protiviti’s Perry Keating and Former U.S. Navy Cybersecurity Director Kathleen Creighton discuss global threats, AI, the...
Subscriber Content
Mon, May 27, 2024
Policies & Procedures

Mobile Device Acceptable Use Policy

This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Mon, May 27, 2024
Articles

Sharpening the Board’s Focus on M&A Due Diligence

In this issue of Board Perspectives, we suggest the most important questions directors should ask during the due diligen...
Subscriber Content
Mon, May 27, 2024
Articles

Cybersecurity Expert: The U.S. Is Facing Big Challenges

Expert analysis on U.S. readiness when it comes to cyber warfare with our adversaries.
Subscriber Content
Mon, May 20, 2024
Articles

Beyond Pass/Fail: Developing a Quantitative Framework for Cybersecurity Audits

This article highlights the consequences of unresolved vulnerabilities and the necessity of effective risk communication...
Subscriber Content
Mon, May 13, 2024
Newsletters

A Call to Action for Boards

In this issue of Board Perspectives, we reveal several important opportunities leaders can take to improve board governa...
Subscriber Content
Mon, May 6, 2024