The following 118 items are listed by Content Data.
Articles
Cybersecurity and Fusion Centers
How organizations can better anticipate potential threats and implement proactive measures to protect their digital asse...
Subscriber Content
Newsletters
A Call for Transparency Amid a Shifting Legal and Regulatory Landscape
This issue of Board Perspectives explains how boards can shore up their governance and oversight in light of emerging tr...
Subscriber Content
Articles
Unleashing the Power of Mobile Threat-Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape
This article discusses the importance of mobile threat-hunting toolkits in modern cybersecurity, emphasizing their abili...
Subscriber Content
Articles
ISO 27001: 2022 – Key Changes and Approaches to Transition
A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Articles
Chair of Absa Group: For Workers, Offices and Operations, Flexibility Is Key to Future Success
Read this conversation between Protiviti’s Joe Kornik and Absa Group Chair Wendy Lucas-Bull about the future of workers,...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Benchmarking Reports
2021 Finance Trends Survey Report: Consumer Products and Retail Industry Group
This report contains several key priorities for retail and CPG finance leaders to consider, based on the results from Pr...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy: Manage Security Configurations RCM
This document outlines risks and controls common to managing security configurations during the security and privacy man...
Subscriber Content
Policies & Procedures
Information Security Management System Policy
This policy establishes the scope of a company's information security management system and characterizes the interfaces...
Subscriber Content
Policies & Procedures
Network Access Control Devices Policy
The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Articles
Tech Can Help Oil and Gas Firms Survive Market Turmoil
Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content