The following 202 items are listed by Content Data.
Policies & Procedures
IT Personnel Security Policy
This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Articles
Future of Privacy Forum CEO Jules Polonetsky on “Exciting but Risky” Road Ahead
Take a closer look at how business leaders can navigate the tricky road ahead for data security and privacy.
Audit Reports
Identity Access Management Report
Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Articles
Confessions of an Ethical Hacker: “I Could Break Into Any Company, All It Takes Is Time”
What C-level executives and board members can do to protect their businesses from attacks and what cybersecurity looks l...
Articles
Establishing a Scalable AI Governance Framework
Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fosterin...
Articles
Understanding the Impact of the EU AI Act: A Primer for Financial Institutions
Navigate the EU AI Act’s impact on finance with our strategic guide to compliance and ethical AI use.
Articles
Due Diligence and Regulatory Update
Key due diligence dos and don’ts and AI’s role in M&A due diligence, its benefits and solutions to challenges, includ...
Audit Programs
Vendor Review Audit Work Program
Improve your company’s vendor management process with the best-practice steps in this audit program sample.
Articles
CPO or No? Protiviti’s Tom Moore on the Evolution of the Privacy Role and Its Uncertain Future
Customers want to collaborate with companies that they trust, and protecting an individual’s privacy leads to that trust...
Articles
The DoD Unveils the Cybersecurity Maturity Model Certification Program: A Primer for Defense Contractors
The DoD’s Cybersecurity Maturity Model Certification Program sets stringent compliance standards to protect sensitive da...
Articles
Best Practices for Building a Sustainable PCI DSS Compliance Program
A look at best practices for developing a sustainable PCI DSS compliance program and how robust governance, specialized ...
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.