The following 194 items are listed by Content Data.
Checklists & Questionnaires
IT Due Diligence Questionnaire
This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Newsletters
Board Oversight of Cyber Risk
Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Checklists & Questionnaires
IT Process Questionnaire: Computer Operations Management
This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Memos
Minimum Testing Standards for Systems and Data Memo
This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Memos
Network Audit Management Memo
This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Memos
Data Governance Review Phase I Memo
This memo documents internal audit's summary of findings from a data governance review.
Subscriber Content
Memos
Data Breach Notification Memo
This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Audit Programs
Access to Programs and Data Audit Work Program
The purpose of this work program—focused on access to programs and data—is to outline the IT general controls to be test...
Subscriber Content
Process Flows
Data Conversion Process Flow
Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Newsletters
Managing Cyber Threats with Confidence
This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Newsletters
Managing Cybersecurity Risk
In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content