The following 118 items are listed by Content Data.
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Articles
2020 Trends in Cybersecurity Breach Disclosures
In this article, Audit Analytics analyzes the trends and statistics of public company cybersecurity disclosures over the...
Subscriber Content
Articles
Cybersecurity Should Be a High Priority for Media Companies Making Crisis Management Plans
This article highlights the scope of media companies’ past cybersecurity efforts and identifies a four-step action plan ...
Subscriber Content
Articles
Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation
This article expands on the key takeaways from the Women Leaders in Cyber Security discussion panel of chief information...
Subscriber Content
Articles
Cybersecurity Trends in 2020: What to Expect and How to Prepare
This article outlines the scope of finance firms’ cybersecurity trends in 2020 and provides seven key actions organizati...
Subscriber Content
Benchmarking Reports
A Look at Key IT Audit Issues: Six Focal Points for CAEs
This paper shares six items at the top of IT audit leaders’ growing priority lists that should resonate with CAEs, based...
Subscriber Content
Articles
Getting Ready for the Threat of Cyber Warfare
This article explains the recent rise in malicious cyber activity directed at U.S. industries and government agencies an...
Subscriber Content
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Newsletters
The Cyber Risk Oversight Challenge
Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Audit Reports
Cybersecurity Audit Report
This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Newsletters
Managing Cyber Threats with Confidence
This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Newsletters
Managing Cybersecurity Risk
In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content