Risk Assessment

The following 785 items are listed by Content Data.
Articles

Three Essential Security Considerations for Your SAP S/4 Implementation

SAP S/4 implementation projects must have the right risk mitigation measures in place as the system goes live.
Subscriber Content
Mon, Jun 19, 2023
Articles

Cybersecurity and Fusion Centers

How organizations can better anticipate potential threats and implement proactive measures to protect their digital asse...
Subscriber Content
Mon, Jun 12, 2023
Policies & Procedures

IT Change Management Policy

This document contains multiple sample policies that provide an overview of procedures organizations should perform duri...
Subscriber Content
Mon, Jun 12, 2023
Articles

Supply Chain Orchestration Graduates From Theory to Leading Practice

Organizations should look to cloud-based supply chain orchestration platforms to respond to ongoing disruptions while me...
Subscriber Content
Mon, Jun 5, 2023
Articles

Technical Debt and Innovation: The CFO’s Perspective

Why innovation and technical debt must be key areas of focus for CFOs and finance leaders.
Subscriber Content
Mon, Jun 5, 2023
Audit Programs

Privacy Audit Work Program

This tool contains two sample work programs that highlight risks to consider and general steps to take when facilitating...
Subscriber Content
Mon, May 29, 2023
Policies & Procedures

IT Governance Policy

Use the established requirements in this policy to oversee information technology resources, achieve company business ob...
Subscriber Content
Mon, May 15, 2023
Articles

Three Keys for Tough Times: Relevance, Culture and Alignment

Protiviti’s Jim DeLoach shares how CEOs, boards of directors and senior executives can achieve success going forward.
Subscriber Content
Mon, May 15, 2023
Policies & Procedures

Credit Risk Policy

This sample outlines a set of policies and procedures formalizing the credit risk management process.
Subscriber Content
Mon, May 8, 2023
Policies & Procedures

Crisis Management and Emergency Operations Policy

This sample policy shares an overview of procedures organizations should take during the crisis management and emergency...
Subscriber Content
Mon, May 8, 2023
Guides

IT and Business Risk Alignment Guide

This sample tool can be used as a guide for understanding and assessing an organization’s IT and business risk alignment...
Subscriber Content
Mon, May 8, 2023
Articles

Unleashing the Power of Mobile Threat-Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape

This article discusses the importance of mobile threat-hunting toolkits in modern cybersecurity, emphasizing their abili...
Subscriber Content
Mon, May 8, 2023