The following 577 items are listed by Content Data.
Articles
Internal Controls Planning as Organizations Contemplate a Return to the Office
In this article, we cover three categories of control changes that companies should consider as they plan to resume in-p...
Subscriber Content
Policies & Procedures
Network Access Control Devices Policy
The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content
Checklists & Questionnaires
Root Cause Analysis Questionnaire
This questionnaire can be used by organizations as a starting point for sourcing the root causes of problems or risks.
Subscriber Content
Audit Programs
Vulnerability Assessment Audit Work Program
This audit program sample offers best-practice general steps for a vulnerability assessment audit, including key objecti...
Subscriber Content
Job Descriptions
Project Controls Group Master Scheduler Job Description
This description summarizes the responsibilities and qualifications for the project controls group master scheduler role...
Subscriber Content
Policies & Procedures
Encryption Key Policy
This tool contains two sample policies that establish guidelines for use of encryption to secure company information ass...
Subscriber Content
Articles
Importance of Internal Controls for Cybersecurity
Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Job Descriptions
Director of IT Project Management Job Description
This sample job description summarizes the responsibilities, key selection criteria and general information for the role...
Subscriber Content
Benchmarking Tools
Data Integrity Risk Key Performance Indicators (KPIs)
What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Benchmarking Tools
System Design Risk Key Performance Indicators (KPIs)
This tool includes key performance indicators and questions an organization should use to evaluate and manage its system...
Subscriber Content
Policies & Procedures
Enterprise Assessment and Monitoring Policy
The purpose of this policy is to develop a consistent method for scheduling and managing company IT security assessment ...
Subscriber Content
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content