The following 233 items are listed by Content Data.
Newsletters
Briefing the Board on IT Matters
In this issue of Board Perspectives: Risk Oversight, we outline three contexts for conducting IT briefings with the boar...
Subscriber Content
Process Flows
IT Change Management Process Flow
To regulate information technology (IT) changes from beginning to end, it’s important to have an IT change management pr...
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 10
In this booklet, we share accounts from some of the world’s leading organizations’ internal audit executives that show t...
Subscriber Content
Newsletters
Oversight of IT Risk Management
In this issue of Board Perspectives: Risk Oversight, we make suggestions for boards to consider as they enhance their ri...
Subscriber Content
Newsletters
Social Business: What it Means to Your Risk Profile
This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content
Protiviti Booklets
Guide to the Sarbanes-Oxley Act: IT Risks and Controls
In this booklet, we provide guidance to Section 404 compliance project teams on the consideration of information technol...
Subscriber Content
Policies & Procedures
User Authentication and Authorization Policy
The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Policies & Procedures
Systems Development Lifecycle (SDLC) and Change Management Policy
This sample outlines a set of policies and procedures designed to provide an orderly process in which changes to a compa...
Subscriber Content
Policies & Procedures
User Malicious Software Policy
The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Newsletters
Ten Questions the Board Should Ask
This issue of Board Perspectives: Risk Oversight provides 10 key questions for boards to consider as they plan their 201...
Subscriber Content
Process Flows
User Access Security Process Flow
This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Newsletters
Risk Management: A Look Back and a Look Forward
In this issue of The Bulletin, we look at how risk management has evolved over the past 25 years and some of the lessons...
Subscriber Content