IT Audit

The following 235 items are listed by Content Data.

Blog

Guide to Records Management

Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...
Thu, Jun 28, 2018
Checklists & Questionnaires

Information Technology (IT) Infrastructure Questionnaire

Use the questions included in this IT audit checklist to better understand your organization's information technology in...
Subscriber Content
Mon, Jun 25, 2018
Audit Reports

Security Assessment Audit Report

This sample report presents the results of an organization's information security audit.
Subscriber Content
Mon, Jun 25, 2018
Internal Audit CPE Courses

Introduction to Information Technology (IT) Audit (KLplus CPE Course)

The objective of this course is to provide internal auditors with a basic understanding of the IT environment and the as...
Mon, Jun 11, 2018
Blog

The Three Components of a Successful Systems Design

What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Thu, Jun 7, 2018
Protiviti Booklets

Internal Auditing Around the World: Volume 14

In Volume XIV of Protiviti’s Internal Auditing Around the World, we take a closer look at internal auditors’ challenges ...
Subscriber Content
Mon, Jun 4, 2018
Checklists & Questionnaires

Update Testing: Control Self-Assessment Questionnaire

This questionnaire helps to assess if the controls are operating effectively within a business unit.
Subscriber Content
Mon, May 28, 2018
Checklists & Questionnaires

General IT Controls Review: Passwords Questionnaire

This tool provides questions to consider while reviewing general IT controls password standards.
Subscriber Content
Mon, May 21, 2018
Checklists & Questionnaires

Self-Assessment Questionnaire: IT Security Remediation

This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Mon, Apr 30, 2018
Audit Reports

Pre-Year 1 SOX Roadmap Audit Report

This audit report summarizes the observations, recommendations, and related remediation prioritization for business and ...
Subscriber Content
Mon, Feb 19, 2018
Blog

What is Transaction Authenticity?

What Is Transaction Authenticity?"Transaction authenticity" can be defined as the authentication of a party...
Thu, Feb 15, 2018
Policies & Procedures

Workstation Use Policy

This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Mon, Jan 22, 2018