The following 165 items are listed by Content Data.
Policies & Procedures
Inventory Valuation Policy
Ensure that your organization’s inventory is properly controlled and prevent losses or shortages with this sample valuat...
Newsletters
Freedom to Fail: Risk Appetite for Innovation
This issue of Board Perspectives explores how boards can thrive in a rapidly changing world by fostering a higher risk a...
Articles
Offense for Defense: The Art and Science of Cybersecurity Red Teaming
How organizations can make informed decisions to enhance their defenses against an increasingly complex and dynamic cybe...
Articles
Principles for Data Recovery From a Severe Cyber Scenario
This white paper explores how firms and regulators can set appropriate risk-based expectations for testing, reporting, r...
Articles
The Power of Digital Twins in the Cybersecurity Mesh
Here, we explore the transformative impact of integrating digital twins into the “cybersecurity mesh,” a decentralized s...
Benchmarking Reports
2023 Global Technology Executive Survey
Technology leaders are exploring new ways to drive innovation and maximize the value of IT in a changing world driven by...
Performer Profiles
Carlyle: Building Relevance From the Start — and Taking It on the Road
Carlyle Global Chief Audit Executive Daniel Mutzig describes how his team aims to increase its relevance and be seen as ...
Articles
Economist Peter Henry Offers a Road Map for a More Equitable and Prosperous Future
Stanford Economist Peter Henry and Protiviti’s Joe Kornik explore the future of money – specifically, what could lead us...
Articles
Metaverse 2030: Defining the “Next Internet” and Finding Ways for Businesses to Thrive in It
New metaverse threats — like invisible-avatar eavesdropping and the cloning of voice and facial features via avatars — w...
Articles
Interweaving the Strands of AI and Soar Onto the Cybersecurity Mesh
This article explores the concept of “cybersecurity mesh” and how the integration of AI could transform this mesh into a...
Articles
Procurement Transformation Fuels Supply Chain Resilience
Redesigning procurement capabilities to support supply chain resilience is a comprehensive undertaking, but execution is...
Articles
Defense Is the Best Offense: The Evolving Role of Cybersecurity Blue Teams and the Impact of Soar Technologies
This article accentuates the tactical implementation of cyber defense mechanisms to augment an organization’s capacity t...