The following 237 items are listed by Content Data.
Benchmarking Reports
2021 IT Audit Benchmarking Survey
Cybersecurity, privacy, data and resilience dominate the top technology challenges for organizations, according to the a...
Subscriber Content
Checklists & Questionnaires
Identity Management Tool Questionnaire
The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Audit Reports
Technical Support Function Audit Report
This sample audit report can be used by auditors for reviewing and noting opportunities for operational and control impr...
Subscriber Content
Audit Reports
Telephony Infrastructure VoIP Audit Report
This sample report can be used by auditors for measuring and enhancing an organization's Voice over Internet Protocol (V...
Subscriber Content
Checklists & Questionnaires
Standardized Testing Program Questionnaire
This tool can be used to gain a better understanding of common SOX standardized testing risks and to develop a standard ...
Subscriber Content
Checklists & Questionnaires
Spreadsheet Risk Optimization Questionnaire
This questionnaire outlines the process to identify who manages critical spreadsheets within an organization and identif...
Subscriber Content
Blog
What You Need to Build Remarkable Partnerships With the IT Organization
The strength of the partnership between IT audit and the IT organization is a significant differe...
Blog
Segregation of Duties: Key Facts You Need to Know
Segregation of duties (SoDs) is an important concept to internal control frameworks, financial reporting an...
Blog
How to Remarkably Audit Your IT Initiatives
Changes to a company’s information technology (IT) environment, both information systems and the underlying...
Blog
Change Management Audits: Key Factors You Need to Know
Information technology is critical to the long-term success of most organizations. It is a key driver for t...
Blog
How to Identify Gaps in Your IT Strategy Process
Everybody is talking about IT strategy these days. As IT managers, you’re faced with considerable pressure ...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...