IT Audit

The following 235 items are listed by Content Data.

Process Flows

Data Conversion Process Flow

Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Mon, Jul 6, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Newsletters

Briefing the Board on IT Matters

In this issue of Board Perspectives: Risk Oversight, we outline three contexts for conducting IT briefings with the boar...
Subscriber Content
Mon, May 11, 2015
Process Flows

IT Change Management Process Flow

To regulate information technology (IT) changes from beginning to end, it’s important to have an IT change management pr...
Subscriber Content
Mon, Nov 10, 2014
Protiviti Booklets

Internal Auditing Around the World: Volume 10

In this booklet, we share accounts from some of the world’s leading organizations’ internal audit executives that show t...
Subscriber Content
Tue, Jul 8, 2014
Newsletters

Oversight of IT Risk Management

In this issue of Board Perspectives: Risk Oversight, we make suggestions for boards to consider as they enhance their ri...
Subscriber Content
Mon, Mar 10, 2014
Newsletters

Social Business: What it Means to Your Risk Profile

This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content
Mon, May 6, 2013
Protiviti Booklets

Guide to the Sarbanes-Oxley Act: IT Risks and Controls

In this booklet, we provide guidance to Section 404 compliance project teams on the consideration of information technol...
Subscriber Content
Mon, Dec 17, 2012
Policies & Procedures

User Authentication and Authorization Policy

The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Mon, Oct 29, 2012
Policies & Procedures

Systems Development Lifecycle (SDLC) and Change Management Policy

This sample outlines a set of policies and procedures designed to provide an orderly process in which changes to a compa...
Subscriber Content
Mon, Oct 22, 2012
Policies & Procedures

User Malicious Software Policy

The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Mon, May 28, 2012
Newsletters

Ten Questions the Board Should Ask

This issue of Board Perspectives: Risk Oversight provides 10 key questions for boards to consider as they plan their 201...
Subscriber Content
Mon, Dec 5, 2011