搜索优化
English
全部
Copilot
图片
视频
地图
资讯
购物
更多
航班
旅游
酒店
搜索
笔记本
Top stories
Sports
U.S.
Local
World
Science
Technology
Entertainment
Business
More
Politics
时间不限
过去 1 小时
过去 24 小时
过去 7 天
过去 30 天
按相关度排序
按时间排序
COBIT
4 小时
Healthcare’s Growing Threat Landscape
In an era where technology is deeply embedded in every aspect of daily life, the healthcare industry is no exception—and ...
COBIT
3 天
Leveraging COBIT for Effective AI System Governance
With artificial intelligence (AI) becoming an essential driver of innovation and efficiency across industries, organizations ...
COBIT
3 天
Five Ways for Risk Professionals to Work More Efficiently in 2025
“Work smarter, not harder.” It’s a simple idea, but in risk management, it’s a game-changer. For 2025, risk professionals are ...
COBIT
1 年
A New Era of Privacy
With the size of privacy teams shrinking amidst an increase in privacy legislation and regulations, ISACA’s fifth annual ...
COBIT
6 天
Positioning DORA Compliance as a Strategic Advantage for Digital Trust and Operational ...
If approached properly, the Digital Operational Resilience Act (DORA) can be a strategic tool to help organizations solidify ...
COBIT
4 天
An Introduction to Web Client Runtime Security
The term Web Client Runtime Security (WCRS) was coined by the authors to highlight the security or possible malicious ...
COBIT
5 天
Best Practices for Ethical and Efficient Deployment of AI in Fintech
Best practices can help provide a guiding light for fintech enterprises hoping to harness AI technologies in a responsible ...
COBIT
2 年
Find an Hour to Advance Your Knowledge
Discover new tools, information and challenges by watching an ISACA webinar. And you earn one CPE credit toward your ISACA certification. All new and on-demand webinars are free for ISACA members and ...
COBIT
5 天
Kicking off 2025 with a New Mission and Vision
"If approached properly, the Digital Operational Resilience Act (DORA) can be a strategic tool to help organizations solidify ...
COBIT
11 天
Don’t Let Excuses Hold You Back: Ten Reasons Why the CISM Certification is Worth the Effort
The Certified Information Security Manager (CISM) certification consistently ranks among the most sought-after credentials in ...
COBIT
3 天
Guidelines for Operationalization of Web Client Runtime Security
This article includes seven suggested steps or activities that organizations may find useful in operationalizing their WCRS programs or capabilities.
COBIT
10 天
Cyberrisk Quantification: A Strategic Imperative for Financial Resilience
As enterprise risk becomes increasingly intricate, the strategic execution of addressing multifaceted threats has grown more ...
当前正在显示可能无法访问的结果。
隐藏无法访问的结果
反馈