The following 773 items are listed by Content Data.
Articles
Defense Is the Best Offense: The Evolving Role of Cybersecurity Blue Teams and the Impact of Soar Technologies
This article accentuates the tactical implementation of cyber defense mechanisms to augment an organization’s capacity t...
Subscriber Content
Policies & Procedures
IT Third-Party Management Policy
Organizations can use the requirements included in this policy to manage the risks associated with vendor relationships.
Subscriber Content
Policies & Procedures
Account Reconciliation Policy
This tool contains multiple sample policies that establish procedures and guidelines organizations can use during their ...
Subscriber Content
Guides
Enterprise Risk Management Project Plan Guide
This guide can be used during the planning phase of implementing ERM across an organization. It supports a phased implem...
Subscriber Content
Guides
Guide to Implementing a Self-Assessment Program
In this tool, we have included three guides that outline the best-practice elements and processes related to developing ...
Subscriber Content
Newsletters
Modernizing Legacy Infrastructure to Increase Competitiveness: The Board’s Role
This issue of Board Perspectives explores how boards can increase agility and sustain the company’s innovation and trans...
Subscriber Content
Articles
Reshaping Loan Servicing Compliance
Servicers should take this multipronged approach to address the growing set of regulatory asks and sharpen their focus o...
Subscriber Content
Guides
Risk Assessment Facilitation Guide
This tool contains three guidance documents that can be used by auditors to facilitate a risk assessment workshop.
Subscriber Content
Articles
Three Essential Security Considerations for Your SAP S/4 Implementation
SAP S/4 implementation projects must have the right risk mitigation measures in place as the system goes live.
Subscriber Content
Policies & Procedures
IT Change Management Policy
This document contains multiple sample policies that provide an overview of procedures organizations should perform duri...
Subscriber Content
Audit Programs
Privacy Audit Work Program
This tool contains two sample work programs that highlight risks to consider and general steps to take when facilitating...
Subscriber Content
Policies & Procedures
IT Governance Policy
Use the established requirements in this policy to oversee information technology resources, achieve company business ob...
Subscriber Content