CXO

Executives, finance wizards, technology, information, and security experts are all represented by the X in CXO. Here is where you'll find the latest research and expertise to drive leadership in all these categories.

  • Third party vendor policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    In today’s era many businesses rely on outside companies, known as third party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. In these instances, it’s likely that third party vendors might collect, store or refer to confidential or...

    Download Now
  • Employee political activity policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political affiliation. From the policy: Introduction No matter where in the world an enterprise operates, politics is going...

    Download Now
  • Asset control policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary cost to the business. The purpose of this policy is...

    Download Now
  • Hiring Kit: Security Analyst

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Successfully finding and recruiting suitable candidates for Security Analyst requires a well thought out plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Security Analyst in your organization. From the hiring kit INTRODUCTION For most modern...

    Download Now
  • Hiring kit: Cryptographer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers, and other encryption systems to protect sensitive data. It can be a difficult position to fill. Using this hiring kit as a template you can find, recruit, and hire the best cryptographer candidate for your business....

    Download Now
  • Moonlighting policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of...

    Download Now
  • Hiring kit: Blockchain Engineer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Recruiting candidates with advanced software engineering experience and a least some familiarity with applied blockchain technology will take time and effort. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Blockchain Engineer in your organization. From the Hiring kit...

    Download Now
  • Hiring kit: Computer Vision Engineer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Finding and recruiting qualified candidates for an open Computer Vision Engineer position will take time and concerted effort backed by a solid plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for your organization. From the hiring...

    Download Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now
  • Artificial intelligence ethics policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence. This policy can be customized as needed to fit the needs of your organization. From the policy: SUMMARY The use of artificial intelligence and machine learning is on the rise in many...

    Download Now