The following 198 items are listed by Content Data.
Policies & Procedures
Security of Data Policy (with UNIX Example)
The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Protiviti Booklets
The Global Privacy and Information Security Landscape: Frequently Asked Questions
This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Blog
Business Intelligence Competency Centers Overview and Guide
The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
Guide to the State of Data Analytics
What is Data Analytics?Data analytics is the practice of embedding insight into operations to drive busines...
Blog
How IT Controls Enhance the Value of IT Assets
It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Blog
How to Identify Remarkable Value in Data Analytics for Internal Audit
Internal auditors have weighed the benefits of data analytics software since the earliest versions of the t...
Blog
Important Factors of Data Analytics You Need to Know
Auditors can use data analytics to avoid the massive waste spending that often goes hand-in-hand with hirin...
Blog
Intellectual Property: Risks You Need to Know
Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Blog
Making the Most of Your Internal Audit Practice
IntroductionIf you are reading this article, you are likely in the internal audit (IA) profession or lookin...
Blog
New Content on KnowledgeLeader - 6/12/2023
ToolsThe following tools were published on KnowledgeLeader this week:IT Change Management PolicyThis d...
Blog
New Content on KnowledgeLeader - 9/11/2023
ToolsThe following tools were published on KnowledgeLeader this week:Password Security PolicyUse the f...