The following 189 items are listed by Content Data.
Performer Profiles
Westpac Group: Refocusing for Relevance
Scott Kieran, Westpac Group’s Chief Audit Executive, discusses how his team has become a well-run, more technology-enabl...
Subscriber Content
Policies & Procedures
Inventory Valuation Policy
Ensure that your organization’s inventory is properly controlled and prevent losses or shortages with this sample valuat...
Subscriber Content
Newsletters
Freedom to Fail: Risk Appetite for Innovation
This issue of Board Perspectives explores how boards can thrive in a rapidly changing world by fostering a higher risk a...
Subscriber Content
Articles
Offense for Defense: The Art and Science of Cybersecurity Red Teaming
How organizations can make informed decisions to enhance their defenses against an increasingly complex and dynamic cybe...
Subscriber Content
Articles
Principles for Data Recovery From a Severe Cyber Scenario
This white paper explores how firms and regulators can set appropriate risk-based expectations for testing, reporting, r...
Subscriber Content
Articles
The Power of Digital Twins in the Cybersecurity Mesh
Here, we explore the transformative impact of integrating digital twins into the “cybersecurity mesh,” a decentralized s...
Subscriber Content
Benchmarking Reports
2023 Global Technology Executive Survey
Technology leaders are exploring new ways to drive innovation and maximize the value of IT in a changing world driven by...
Subscriber Content
Performer Profiles
Carlyle: Building Relevance From the Start — and Taking It on the Road
Carlyle Global Chief Audit Executive Daniel Mutzig describes how his team aims to increase its relevance and be seen as ...
Subscriber Content
Articles
Economist Peter Henry Offers a Road Map for a More Equitable and Prosperous Future
Stanford Economist Peter Henry and Protiviti’s Joe Kornik explore the future of money – specifically, what could lead us...
Subscriber Content
Articles
Metaverse 2030: Defining the “Next Internet” and Finding Ways for Businesses to Thrive in It
New metaverse threats — like invisible-avatar eavesdropping and the cloning of voice and facial features via avatars — w...
Subscriber Content
Articles
Interweaving the Strands of AI and Soar Onto the Cybersecurity Mesh
This article explores the concept of “cybersecurity mesh” and how the integration of AI could transform this mesh into a...
Subscriber Content
Articles
Procurement Transformation Fuels Supply Chain Resilience
Redesigning procurement capabilities to support supply chain resilience is a comprehensive undertaking, but execution is...
Subscriber Content