Governance

Cybersecurity Governance and Compliance

Cybersecurity Governance and Compliance

The key to success of a security governance program is focused on aligning governance initiatives with your organization’s overall business strategy and risk profile.

Catching the Digital Wave of ChangeCatching the Digital Wave of Change

A digital revolution is currently taking place that is transforming the world we live in. Over the next few years, many organizations will need to undergo radical change programs and, in some cases, completely reinvent themselves to remain relevant and competitive.

Internal Audit Capabilities and Needs Great Tech SpectationsInternal Audit Capabilities and Needs: Great “Tech-spectations”

Protiviti’s 2018 Internal Audit Capabilities and Needs Survey makes it clear that internal audit has arrived at a point where it needs to evolve its analytics and technological proficiency among all individuals within the function, as opposed to relying on a single technology “specialist.”


Content Library_Risk_GovernanceBecoming agile: A guide to elevating internal audit’s performance and value

Internal auditors face a wide range of challenges. Yet the overarching theme for most Internal Audit groups is the need to change. This paper looks at how the Agile Internal Audit approach provides methods that work to change both the mindset of internal auditors and their work processes.

Agile GRCAgile GRC: a new approach to governance, trust and risk in the digital age

“Faster, better, more” has become the baseline of expectations in the digital world. Now, it is the time for governance, risk management and compliance (GRC) functions to wake up and participate actively in shaping the future in the digital world…

Risk

Content Library_Risk_DeloitteAuditing the risks of disruptive technologies: Internal audit in the age of digitalization

Learn more about the specific risks associated with disruptive digital technologies and review suggestions to help IA departments navigate and assess these risks.

Understanding cybersecurityUnderstanding cybersecurity and operational risks

What are cryptocurrencies? Why are they so popular? And what are the key risks and challenges of investing in them right now?

Top Five Features of a Self-Funded Insurance PlanTop Five Features of a Self-Funded Insurance Plan

What does the Right to Try (RTT) Act recently signed into law mean for healthcare and healthcare plan members? The answer is equal parts important and complicated. We’ll update and unpack every detail of what is arguably one of the hottest topics in healthcare during the next webinar from Healthcare Management Administrators (HMA).

Workforce of the future

Workforce of the future: The competing forces shaping 2030

We are living through fundamental changes in the way we work. To better understand these changes, PwC asked over 10,000 people across the globe to share their thoughts on what work could look like in 2030. What we found gives insight into what the future of work may hold and how to start moving there today.

Risk in ReviewRisk in Review

PwC explores how risk leaders can effectively manage innovation-related risk and by doing so, drive growth and performance.

A Guide to IT Monitoring and ManagementA Guide to IT Monitoring and Management

A network operations center (NOC) is the heart of an IT managed services provider – monitoring, managing and responding to alerts on your network’s health, performance and security.  Do you know what NOC services are and how they can positively benefit your organization? Download our whitepaper to find out.

Should You Implement Disaster Recovery in the CloudShould You Implement Disaster Recovery in the Cloud

Business Data Loss can be the result of anything from hacking to a natural disaster – and sometimes these losses are catastrophes from which a business cannot recover.  Download our whitepaper to learn how moving disaster recovery to the cloud can provide a quick response, cost efficient, and flexible plan.

Keep your eye on the basics as your cybersecurity strategy evolvesKeep your eye on the basics as your cybersecurity strategy evolves

Cybersecurity strategies can rely on advanced technologies to combat complex threats. But sometimes, basic precautions are neglected, leading to breaches that could have easily been avoided…

Intelligent Automation and Internal Audit2Intelligent automation and internal audit: considerations for assessing and leveraging intelligent automation

Internal audit has a critical role to play in enterprise-wide intelligent automation programs. It can—and should—have a seat at the table in developing the organization’s intelligent automation strategy and implementation plan across all three lines of defense.

Compliance

General data protectionGeneral data protection regulation compliance.

With GDPR’s potentially significant fines and penalties, companies must know where they stand and how to react before it’s too late.

Right to TryRight to Try - Issues and Answers

What does the Right to Try (RTT) Act recently signed into law mean for healthcare and healthcare plan members? The answer is equal parts important and complicated. We’ll update and unpack every detail of what is arguably one of the hottest topics in healthcare during the next webinar from Healthcare Management Administrators (HMA).

Ethics

Data analysis and predictive modeling -  a new approach to risk cultureData analysis and predictive modeling: A new approach to risk culture.

Description: A combination of risk assessment using prediction—actual internal audit work focused on culture as root case for control failure—together with focused improvement initiatives can and will help reduce the number of unwanted and embarrassing headlines.

Outlook Outlook
iCal iCal
Google Google
Yahoo! Yahoo!
MSN MSN
Top