The following 177 items are listed by Content Data.
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Articles
Digital Expert: Metadata and ID Keys to Unlocking E-Government
ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Subscriber Content
Policies & Procedures
Personnel Records Policy
Download our personnel records policy for effective document retention and employee privacy management guidelines.
Subscriber Content
Articles
Building Your Toolkit for Quantifying Cyber Risk
A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Subscriber Content
Audit Reports
Business Maturity Assessment Report
Evaluate current- and future-state processes and gain insights into management strategies with the CMM in this audit rep...
Subscriber Content
Policies & Procedures
Patient Admission Policy
Learn about our Patient Admission Policy and insurance benefits verification process for a streamlined and efficient exp...
Subscriber Content
Guides
IT Compliance Guide
Use the real-world techniques and receive usable templates in this guide to manage and execute your IT compliance initia...
Subscriber Content
Articles
Former Cybersecurity Director: U.S. Navy Data Is the New Oil; We Need to Protect It
Protiviti’s Perry Keating and Former U.S. Navy Cybersecurity Director Kathleen Creighton discuss global threats, AI, the...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Articles
Sharpening the Board’s Focus on M&A Due Diligence
In this issue of Board Perspectives, we suggest the most important questions directors should ask during the due diligen...
Subscriber Content
Articles
Cybersecurity Expert: The U.S. Is Facing Big Challenges
Expert analysis on U.S. readiness when it comes to cyber warfare with our adversaries.
Subscriber Content
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Subscriber Content