The following 106 items are listed by Content Data.
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Articles
Tech Can Help Oil and Gas Firms Survive Market Turmoil
Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Articles
2020 Trends in Cybersecurity Breach Disclosures
In this article, Audit Analytics analyzes the trends and statistics of public company cybersecurity disclosures over the...
Subscriber Content
Articles
Cybersecurity Should Be a High Priority for Media Companies Making Crisis Management Plans
This article highlights the scope of media companies’ past cybersecurity efforts and identifies a four-step action plan ...
Subscriber Content
Articles
Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation
This article expands on the key takeaways from the Women Leaders in Cyber Security discussion panel of chief information...
Subscriber Content
Articles
Insurers Targeted in UK Supervisory Authorities’ Latest Effort to Develop Formal Operational Resilience Regulations
This article provides some insight on what makes global insurers the latest regulatory effort to strengthen the operatio...
Subscriber Content
Articles
Cybersecurity Trends in 2020: What to Expect and How to Prepare
This article outlines the scope of finance firms’ cybersecurity trends in 2020 and provides seven key actions organizati...
Subscriber Content
Benchmarking Reports
A Look at Key IT Audit Issues: Six Focal Points for CAEs
This paper shares six items at the top of IT audit leaders’ growing priority lists that should resonate with CAEs, based...
Subscriber Content
Articles
Getting Ready for the Threat of Cyber Warfare
This article explains the recent rise in malicious cyber activity directed at U.S. industries and government agencies an...
Subscriber Content
Benchmarking Reports
2019 IT Audit Benchmarking Survey
This report uncovers key findings from the 2019 Global IT Audit Benchmarking Study conducted by ISACA and Protiviti.
Subscriber Content