Data Security

The following 195 items are listed by Content Data.
Process Flows

Data Conversion Process Flow

Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Mon, Jul 6, 2015
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015
Audit Programs

IT Data Management Audit Work Program

This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Mon, May 25, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Newsletters

Managing Cyber Threats with Confidence

This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Mon, Apr 13, 2015
Audit Programs

Customer Credit Data Analytics Audit Work Program

This eight-page work program utilizes data analytics to review the customer credit process.
Subscriber Content
Mon, Feb 10, 2014
Audit Programs

Payroll Cycle Data Analytics Audit Work Program

This six-page work program describes 22 risks associated with payroll cycle data analytics, with a focus on the tests us...
Subscriber Content
Mon, Feb 3, 2014
Newsletters

Managing Cybersecurity Risk

In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Mon, Jun 10, 2013
Policies & Procedures

Security of Data Policy (with UNIX Example)

The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Mon, Mar 14, 2011
Blog

A Guide to Reviewing Your Organization’s Data Mining and Data Analytics Practices

In the realm of computer science, the term data mining is interchangeable with the term knowledge discovery...
Thu, Aug 25, 2022
Blog

Business Intelligence Competency Centers Overview and Guide

The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...
Wed, Jun 28, 2017
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019