The following 235 items are listed by Content Data.
Newsletters
Improving Your Company’s Risk Assessment Process
This issue of Board Perspectives summarizes 10 practices that will help management and directors maximize the value deri...
Subscriber Content
Checklists & Questionnaires
IT Process Questionnaire: Computer Operations Management
This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Memos
Minimum Testing Standards for Systems and Data Memo
This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Risk & Control Matrices - RCMs
Manage IT Assets RCM
This document outlines risks and controls common to the "manage IT assets" process in an RCM format.
Subscriber Content
Memos
Network Audit Management Memo
This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Risk & Control Matrices - RCMs
Application Control Review RCM
This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Memos
Scope of Application Security Memo
This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Service RCM
This document outlines risks and controls common to the "manage service" process in a risk and control matrix (RCM) form...
Subscriber Content
Memos
Data Governance Review Phase I Memo
This memo documents internal audit's summary of findings from a data governance review.
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 12
In our latest edition of Internal Auditing Around the World, we interviewed 22 inspiring female internal audit leaders w...
Subscriber Content
Audit Programs
Siebel/Oracle Information Security Audit Work Program
This audit program outlines procedures to evaluate six system control objectives.
Subscriber Content
Audit Programs
UNIX Security Audit Work Program
This audit program outlines steps for reviewing the security of systems running the UNIX operating system.
Subscriber Content