IT Audit

The following 230 items are listed by Content Data.

Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

IT System Pre-Implementation Review Audit Report

This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Mon, Nov 27, 2017
Checklists & Questionnaires

IT Risk Assessment Questionnaire

This tool includes risk assessment questions for both IT management and executive IT management.
Subscriber Content
Mon, Sep 4, 2017
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Methodologies & Models

Protiviti Risk Model

The Protiviti Risk Model is a comprehensive organizing framework for defining and understanding potential business risks...
Subscriber Content
Mon, Jul 31, 2017
Blog

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Mon, Jul 17, 2017
Checklists & Questionnaires

IT Due Diligence Questionnaire

This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Mon, Jun 19, 2017
Blog

What Is Internal Audit’s Role in Cybersecurity?

Corporations are always thinking about how to protect assets. A few of the white-collar crimes compani...
Fri, Jun 9, 2017
Newsletters

Board Oversight of Cyber Risk

Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Mon, May 1, 2017
Newsletters

Improving Your Company’s Risk Assessment Process

This issue of Board Perspectives summarizes 10 practices that will help management and directors maximize the value deri...
Subscriber Content
Mon, Apr 24, 2017
Checklists & Questionnaires

IT Process Questionnaire: Computer Operations Management

This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Mon, Apr 17, 2017