The following 230 items are listed by Content Data.
Policies & Procedures
Sensitive Data Handling Policy
The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Audit Reports
IT System Pre-Implementation Review Audit Report
This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Checklists & Questionnaires
IT Risk Assessment Questionnaire
This tool includes risk assessment questions for both IT management and executive IT management.
Subscriber Content
Audit Reports
Cybersecurity Audit Report
This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Methodologies & Models
Protiviti Risk Model
The Protiviti Risk Model is a comprehensive organizing framework for defining and understanding potential business risks...
Subscriber Content
Blog
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Checklists & Questionnaires
IT Due Diligence Questionnaire
This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Blog
What Is Internal Audit’s Role in Cybersecurity?
Corporations are always thinking about how to protect assets. A few of the white-collar crimes compani...
Newsletters
Board Oversight of Cyber Risk
Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Newsletters
Improving Your Company’s Risk Assessment Process
This issue of Board Perspectives summarizes 10 practices that will help management and directors maximize the value deri...
Subscriber Content
Checklists & Questionnaires
IT Process Questionnaire: Computer Operations Management
This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content