The following 781 items are listed by Content Data.
Articles
Three Essential Security Considerations for Your SAP S/4 Implementation
SAP S/4 implementation projects must have the right risk mitigation measures in place as the system goes live.
Subscriber Content
Articles
Cybersecurity and Fusion Centers
How organizations can better anticipate potential threats and implement proactive measures to protect their digital asse...
Subscriber Content
Policies & Procedures
IT Change Management Policy
This document contains multiple sample policies that provide an overview of procedures organizations should perform duri...
Subscriber Content
Articles
Supply Chain Orchestration Graduates From Theory to Leading Practice
Organizations should look to cloud-based supply chain orchestration platforms to respond to ongoing disruptions while me...
Subscriber Content
Articles
Technical Debt and Innovation: The CFO’s Perspective
Why innovation and technical debt must be key areas of focus for CFOs and finance leaders.
Subscriber Content
Audit Programs
Privacy Audit Work Program
This tool contains two sample work programs that highlight risks to consider and general steps to take when facilitating...
Subscriber Content
Policies & Procedures
IT Governance Policy
Use the established requirements in this policy to oversee information technology resources, achieve company business ob...
Subscriber Content
Articles
Three Keys for Tough Times: Relevance, Culture and Alignment
Protiviti’s Jim DeLoach shares how CEOs, boards of directors and senior executives can achieve success going forward.
Subscriber Content
Policies & Procedures
Credit Risk Policy
This sample outlines a set of policies and procedures formalizing the credit risk management process.
Subscriber Content
Policies & Procedures
Crisis Management and Emergency Operations Policy
This sample policy shares an overview of procedures organizations should take during the crisis management and emergency...
Subscriber Content
Guides
IT and Business Risk Alignment Guide
This sample tool can be used as a guide for understanding and assessing an organization’s IT and business risk alignment...
Subscriber Content
Articles
Unleashing the Power of Mobile Threat-Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape
This article discusses the importance of mobile threat-hunting toolkits in modern cybersecurity, emphasizing their abili...
Subscriber Content