The following 547 items are listed by Content Data.
Job Descriptions
Project Controls Group Master Scheduler Job Description
This description summarizes the responsibilities and qualifications for the project controls group master scheduler role...
Subscriber Content
Articles
Importance of Internal Controls for Cybersecurity
Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Policies & Procedures
Encryption Key Policy
This tool contains two sample policies that establish guidelines for use of encryption to secure company information ass...
Subscriber Content
Job Descriptions
Director of IT Project Management Job Description
This sample job description summarizes the responsibilities, key selection criteria and general information for the role...
Subscriber Content
Benchmarking Tools
System Design Risk Key Performance Indicators (KPIs)
This tool includes key performance indicators and questions an organization should use to evaluate and manage its system...
Subscriber Content
Policies & Procedures
Enterprise Assessment and Monitoring Policy
The purpose of this policy is to develop a consistent method for scheduling and managing company IT security assessment ...
Subscriber Content
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Benchmarking Tools
Apply Best Practices Across the Organization Key Performance Indicators (KPIs)
This tool defines leading practices and questions to consider related to implementing and maintaining best practices acr...
Subscriber Content
Performer Profiles
Salesforce: V2MOM and Setting a Vision for Salesforce Audit
In this profile, Art Perez, senior vice president and audit executive at Salesforce, explains the V2MOM planning process...
Subscriber Content
Policies & Procedures
System Software Development Policy
This template can be used to record a company’s system software development policy and requirements and the responsibili...
Subscriber Content
Policies & Procedures
IT Auditing and Logging Standard Policy
The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Checklists & Questionnaires
Evaluation of Control Deficiencies Questionnaire
This sample questionnaire can be used by auditors to efficiently assess and classify an organization’s control deficienc...
Subscriber Content