The following 181 items are listed by Content Data.
Performer Profiles
Westpac Group: Refocusing for Relevance
Scott Kieran, Westpac Group’s Chief Audit Executive, discusses how his team has become a well-run, more technology-enabl...
Subscriber Content
Policies & Procedures
Inventory Valuation Policy
Ensure that your organization’s inventory is properly controlled and prevent losses or shortages with this sample valuat...
Subscriber Content
Articles
Offense for Defense: The Art and Science of Cybersecurity Red Teaming
How organizations can make informed decisions to enhance their defenses against an increasingly complex and dynamic cybe...
Subscriber Content
Articles
Principles for Data Recovery From a Severe Cyber Scenario
This white paper explores how firms and regulators can set appropriate risk-based expectations for testing, reporting, r...
Subscriber Content
Benchmarking Reports
2023 Global Technology Executive Survey
Technology leaders are exploring new ways to drive innovation and maximize the value of IT in a changing world driven by...
Subscriber Content
Performer Profiles
Carlyle: Building Relevance From the Start — and Taking It on the Road
Carlyle Global Chief Audit Executive Daniel Mutzig describes how his team aims to increase its relevance and be seen as ...
Subscriber Content
Articles
Metaverse 2030: Defining the “Next Internet” and Finding Ways for Businesses to Thrive in It
New metaverse threats — like invisible-avatar eavesdropping and the cloning of voice and facial features via avatars — w...
Subscriber Content
Articles
Interweaving the Strands of AI and Soar Onto the Cybersecurity Mesh
This article explores the concept of “cybersecurity mesh” and how the integration of AI could transform this mesh into a...
Subscriber Content
Articles
Procurement Transformation Fuels Supply Chain Resilience
Redesigning procurement capabilities to support supply chain resilience is a comprehensive undertaking, but execution is...
Subscriber Content
Articles
Defense Is the Best Offense: The Evolving Role of Cybersecurity Blue Teams and the Impact of Soar Technologies
This article accentuates the tactical implementation of cyber defense mechanisms to augment an organization’s capacity t...
Subscriber Content
Policies & Procedures
Account Reconciliation Policy
This tool contains multiple sample policies that establish procedures and guidelines organizations can use during their ...
Subscriber Content
Regulatory Updates
U.S. Banking Regulators Finalize (Finally) Revised Third-Party Risk Management Guidance
Learn about the finalized and revised third-party risk management guidance by U.S. banking regulators, ensuring robust r...
Subscriber Content