Privacy

The following 206 items are listed by Content Data.
Policies & Procedures

Information Security Development Policy

This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Subscriber Content
Mon, Nov 20, 2023
Benchmarking Reports

What Boards Need to Know About the CFO’s Changing Priorities

Five finance priorities boards should keep in mind as they engage with CFOs, according to the results of Protiviti’s 202...
Subscriber Content
Mon, Nov 20, 2023
Policies & Procedures

Acceptable Use Policy

This tool contains two sample policies that establish standards and procedures organizations should follow for governing...
Subscriber Content
Mon, Oct 30, 2023
Articles

The Digital Currency Revolution Is Upon Us. Only the Global Economy Is at Stake

Governments are eager to position themselves for the next stage of the digital revolution in financial services by issui...
Subscriber Content
Mon, Oct 30, 2023
Articles

The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead

This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content
Mon, Oct 16, 2023
Articles

Former Schwab CEO Evelyn Dilsaver Talks AI, Crypto and Future of Financial Services

Protiviti’s Joe Kornik and former Schwab CEO Evelyn Dilsaver reflect on financial services of the past and look ahead at...
Subscriber Content
Mon, Oct 9, 2023
Benchmarking Reports

2023 Global Technology Executive Survey

Technology leaders are exploring new ways to drive innovation and maximize the value of IT in a changing world driven by...
Subscriber Content
Mon, Sep 25, 2023
Policies & Procedures

Confidentiality Policy

This tool includes three sample policies that define guidelines concerning confidential company information.
Subscriber Content
Mon, Sep 25, 2023
Articles

Metaverse 2030: Defining the “Next Internet” and Finding Ways for Businesses to Thrive in It

New metaverse threats — like invisible-avatar eavesdropping and the cloning of voice and facial features via avatars — w...
Subscriber Content
Mon, Sep 11, 2023
Policies & Procedures

Password Security Policy

Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Mon, Sep 11, 2023
Regulatory Updates

SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence

This Flash Report summarizes the SEC’s adopted amendments to its rules on cybersecurity disclosures and provides guidanc...
Subscriber Content
Mon, Aug 21, 2023
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 14, 2023