IT Security

The following 210 items are listed by Content Data.
Articles

Responsible Privacy: Is the Board Doing Its Part? — Protiviti Whitepaper

This article provides an extended summary of the significant points made during a recent National Association of Corpora...
Subscriber Content
Mon, Nov 4, 2019
Benchmarking Reports

2019 IT Audit Benchmarking Survey

This report uncovers key findings from the 2019 Global IT Audit Benchmarking Study conducted by ISACA and Protiviti.
Subscriber Content
Mon, Oct 28, 2019
Newsletters

Responsible Privacy: Is the Board Doing Its Part?

This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content
Mon, Oct 28, 2019
Articles

Capitalizing on Predictive Maintenance (PdM) Benefits in Manufacturing

This article explores the operational and financial benefits of PdM and suggests ways an organization can deploy a PdM s...
Subscriber Content
Mon, Oct 7, 2019
Performer Profiles

Brinks Home Security: ‘‘Just Start’’ — Advancing and Refining a Next-Generation Audit Approach

In this profile, Brinks Home Security Senior Director of Internal Audit Lynne Howison discusses her department’s use of ...
Subscriber Content
Mon, Sep 16, 2019
Newsletters

PreView: Protiviti's View on Emerging Risks, July 2019

In this issue of PreView, we address selected cloud-related risks, such as vendor lock-in, legal holds and cloud vendor ...
Subscriber Content
Mon, Sep 2, 2019
Articles

Programs, Policies, Principles and People Can Move ‘‘Ethical AI’’ From a Nebulous Concept to a Meaningful Practice

This article describes four key areas organizations should consider for the ethical development and use of AI.
Subscriber Content
Mon, Sep 2, 2019
Performer Profiles

Anixter International Inc.: Wiring Up Business Transformation

In this profile, Anixter Senior Vice President, Internal Audit and Chief Audit Executive Ed Rogowski explains how he use...
Subscriber Content
Mon, Aug 26, 2019
Checklists & Questionnaires

IT Application Security Questionnaire

This sample questionnaire is designed to monitor and enhance an organization's IT application security process.
Subscriber Content
Mon, Aug 19, 2019
Articles

Who Is Watching the Bots? Part One: RPA Governance

This article explains how robotic process automation (RPA) at scale requires good governance to enable success while hel...
Subscriber Content
Mon, Aug 19, 2019
Audit Reports

Security Policy and Procedures Evaluation Report: Controls and Responsibility

This sample audit report records the results of a security policies and procedures evaluation. The review illustrates se...
Subscriber Content
Mon, Aug 5, 2019
Articles

Identity and Access Management in Financial Services: Staying Ahead of the Curve

Here, Protiviti’s Carol Beaumier and Matthew Kotraba discuss security and privacy trends in financial services and sugge...
Subscriber Content
Mon, Jul 15, 2019