The following 205 items are listed by Content Data.
Risk & Control Matrices - RCMs
Manage Data Center Operations: Data Warehouse and Business Intelligence Management RCM
This document outlines risks and controls common to data warehouse and business intelligence management in a risk contro...
Subscriber Content
Data Analytics CPE Courses
Robotic Process Automation and Internal Audit – Are You Ready? (KLplus CPE Course)
This course covers robotic process automation (RPA) and why internal audit leaders should care about it.
Articles
Building a Comprehensive Data Privacy Program
Protiviti offers advice on how companies can both formalize and improve data privacy practices, including a four-step ap...
Subscriber Content
Policies & Procedures
Telecommunication Usage Policy
This sample policy defines guidelines and procedures organizations should follow when using telecommunications systems.
Subscriber Content
Performer Profiles
DBS Bank: Using Data to Highlight Risks, Increase Resilience and Usher in the Future of Audit
In this profile, Derrick Goh, managing director and head of group audit at DBS, describes how data has helped his team b...
Subscriber Content
Policies & Procedures
Physical Security Standard Policy
The purpose of this policy is to create and maintain a physically secure environment that protects company property and ...
Subscriber Content
Audit Programs
Enterprise Resource Planning Security Audit Work Program
In this work program sample, we list general best-practice steps for the enterprise resource planning security process.
Subscriber Content
Articles
Preparing for a Dynamic Post-Pandemic Fraud Landscape
The five strategies described in this article can help organizations strengthen their fraud prevention practices and avo...
Subscriber Content
Benchmarking Tools
Privacy Program Leading Practices
This tool features several leading practices to consider when establishing a privacy program.
Subscriber Content
Articles
New Survey Reveals Four Habits of Highly Resilient CFOs
Learn the four habits that CFOs should ingrain into their jobs, based on the top finance challenges and areas of focus r...
Subscriber Content
Articles
How Firms Can Tackle Technology Risk Blind Spots to Build Resilience
Protiviti’s Ewen Ferguson and Hirun Tantirigama identify common critical technology risks and illustrate what organizati...
Subscriber Content
Policies & Procedures
Network Access Control Devices Policy
The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content