The following 205 items are listed by Content Data.
Regulatory Updates
White House Issues Executive Order to “Seize the Promise and Manage the Risks” of AI
This Flash Report summarizes the key directives in President Biden’s first executive order on artificial intelligence an...
Subscriber Content
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Subscriber Content
Benchmarking Reports
What Boards Need to Know About the CFO’s Changing Priorities
Five finance priorities boards should keep in mind as they engage with CFOs, according to the results of Protiviti’s 202...
Subscriber Content
Policies & Procedures
Acceptable Use Policy
This tool contains two sample policies that establish standards and procedures organizations should follow for governing...
Subscriber Content
Articles
The Digital Currency Revolution Is Upon Us. Only the Global Economy Is at Stake
Governments are eager to position themselves for the next stage of the digital revolution in financial services by issui...
Subscriber Content
Articles
The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead
This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content
Articles
Former Schwab CEO Evelyn Dilsaver Talks AI, Crypto and Future of Financial Services
Protiviti’s Joe Kornik and former Schwab CEO Evelyn Dilsaver reflect on financial services of the past and look ahead at...
Subscriber Content
Benchmarking Reports
2023 Global Technology Executive Survey
Technology leaders are exploring new ways to drive innovation and maximize the value of IT in a changing world driven by...
Subscriber Content
Policies & Procedures
Confidentiality Policy
This tool includes three sample policies that define guidelines concerning confidential company information.
Subscriber Content
Articles
Metaverse 2030: Defining the “Next Internet” and Finding Ways for Businesses to Thrive in It
New metaverse threats — like invisible-avatar eavesdropping and the cloning of voice and facial features via avatars — w...
Subscriber Content
Policies & Procedures
Password Security Policy
Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Regulatory Updates
SEC Cybersecurity Disclosure Enhancements: Efforts to Boost Investor Confidence
This Flash Report summarizes the SEC’s adopted amendments to its rules on cybersecurity disclosures and provides guidanc...
Subscriber Content