The following 312 items are listed by Content Data.
Policies & Procedures
IT System Access and Re-Certification Policy
Learn about the guidelines for securing digital infrastructure and maintaining proper system access security with this p...
Policies & Procedures
Software Upgrade Policy
Identify and define your company's philosophy toward maintaining up-to-date software applications with this sample polic...
Audit Programs
System Intrusion Audit Work Program
Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Benchmarking Reports
Executive Perspectives on Top Risks for 2024 and a Decade Later: From AI to Cyber — Deconstructing a Complex Technology Risk Landscape
Why auditors need to adopt new strategies and increase audit frequency to stay ahead in an evolving environment.
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Audit Reports
IT Audit Update: Audit Committee Report
Utilize this audit report sample to evaluate your organization’s general computer control risks and report on the progre...
Checklists & Questionnaires
Data Center General Controls Questionnaire
Use this questionnaire to meticulously evaluate your mainframe data center's operational controls and enhance security, ...
Audit Programs
System Management Risk Assessment and Control Audit Work Program
This work program will assist audit teams with identifying risks and related controls for logical security administratio...
Policies & Procedures
Remote Network Access Policy
This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Guides
IT General Controls Guide
Use the automation and standardization best practices in this guide to enhance IT processes and improve compliance.
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
This comprehensive tool includes two sample IT disaster recovery plan checklists with best-practice questions for pre-pl...
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...