The following 170 items are listed by Content Data.
Risk & Control Matrices - RCMs
Manage Security and Privacy: Administer Security – IT Applications RCM
Manage common IT application risks, including inappropriate and/or unauthorized security access, using this risk and con...
Subscriber Content
Blog
Topic Spotlight: IT Controls
Companies find themselves navigating a treacherous terrain of IT control risks, fueled by an ever-growing d...
Policies & Procedures
Mobile Device Acceptable Use Policy
Establish clear rules for mobile device use to safeguard corporate data, reduce security risks and support compliant bus...
Audit Programs
Data Conversion Audit Work Program
Drive seamless data conversion with actionable audit strategies that prioritize accuracy, integrity and secure migration...
Checklists & Questionnaires
Data Center General Controls Questionnaire
Assess and strengthen your organization’s Data Center security, operations and compliance measures with this questionnai...
Articles
From Gridlock to Governance: The Case for a High-Performing Architecture Review Board
Maximize your technology budgets by implementing effective architectural governance to reduce technical debt and drive s...
Blog
Topic Spotlight: Audit Testing
Audit testing presents several risks for companies, primarily related to the possibility of material missta...
Policies & Procedures
IT Security Policy
Download our IT Security Risk Policy to protect critical assets, ensure compliance, and define roles and responsibilitie...
Blog
IT Controls Risk Management: A Strategic Guide
Strengthening IT Controls in a Complex Risk EnvironmentEffective IT controls underpin organizational s...
Blog
KnowledgeLeader’s Top 25 of 2025
As another year comes to a close, it’s the perfect time to reflect on the standout tools and publications t...
Audit Programs
Firewall Audit Work Program
Strengthen your network defenses by following our step-by-step firewall audit program for effective security, compliance...
Articles
The Cybersecurity Blind Spot in SOX Compliance and How to Fix It
Enhance cybersecurity fundamentals to combat ransomware and comply with new SEC disclosure rules.