Cybersecurity

The following 118 items are listed by Content Data.
Policies & Procedures

End-User Information Security Background Policy

This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Mon, Mar 29, 2021
Articles

2020 Trends in Cybersecurity Breach Disclosures

In this article, Audit Analytics analyzes the trends and statistics of public company cybersecurity disclosures over the...
Subscriber Content
Mon, Aug 24, 2020
Articles

Cybersecurity Should Be a High Priority for Media Companies Making Crisis Management Plans

This article highlights the scope of media companies’ past cybersecurity efforts and identifies a four-step action plan ...
Subscriber Content
Mon, Jul 20, 2020
Articles

Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation

This article expands on the key takeaways from the Women Leaders in Cyber Security discussion panel of chief information...
Subscriber Content
Mon, Jun 29, 2020
Articles

Cybersecurity Trends in 2020: What to Expect and How to Prepare

This article outlines the scope of finance firms’ cybersecurity trends in 2020 and provides seven key actions organizati...
Subscriber Content
Mon, Jun 22, 2020
Benchmarking Reports

A Look at Key IT Audit Issues: Six Focal Points for CAEs

This paper shares six items at the top of IT audit leaders’ growing priority lists that should resonate with CAEs, based...
Subscriber Content
Mon, Mar 16, 2020
Articles

Getting Ready for the Threat of Cyber Warfare

This article explains the recent rise in malicious cyber activity directed at U.S. industries and government agencies an...
Subscriber Content
Mon, Mar 16, 2020
Newsletters

Sharpening the Focus on Cybersecurity

This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Mon, Apr 1, 2019
Newsletters

The Cyber Risk Oversight Challenge

Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Mon, Apr 23, 2018
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Newsletters

Managing Cyber Threats with Confidence

This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Mon, Apr 13, 2015
Newsletters

Managing Cybersecurity Risk

In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Mon, Jun 10, 2013