The following 325 items are listed by Content Data.
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Policies & Procedures
Data Access and User Authentication Policy
The purpose of this access management policy is to ensure that access to all company systems and applications is properl...
Subscriber Content
Policies & Procedures
IT Auditing and Logging Standard Policy
The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Articles
SOX Compliance Under COVID-19: The Show Must Go On (Part 2)
Part two of this two-part discussion addresses some of the questions asked during Protiviti’s recent webinar on maintain...
Subscriber Content
Benchmarking Reports
2021 IT Audit Benchmarking Survey
Cybersecurity, privacy, data and resilience dominate the top technology challenges for organizations, according to the a...
Subscriber Content
Checklists & Questionnaires
Identity Management Tool Questionnaire
The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Policies & Procedures
Spreadsheet Controls Policy
This tool contains two samples that outline policies and procedures to give guidance and ensure compliance related to fi...
Subscriber Content
Articles
Pre-IPO Companies – Put Your Vendors’ SOC Reports on Your 2020 Reading List
This article underlines the importance of SOC reporting and how it can better prepare private companies for a successful...
Subscriber Content
Audit Reports
Technical Support Function Audit Report
This sample audit report can be used by auditors for reviewing and noting opportunities for operational and control impr...
Subscriber Content
Articles
Hackathon to Save Small Business
Learn what was discussed during an Alliance for Innovative Regulation (AIR) hackathon to save small business that Protiv...
Subscriber Content
Audit Reports
IT Asset Management Audit Report
This sample audit report can be used to improve and better understand an organization's IT asset management (ITAM) proce...
Subscriber Content
Audit Programs
Social Engineering Audit Work Program
This sample work program provides general steps organizations should follow when performing a social engineering audit.
Subscriber Content