The following 171 items are listed by Content Data.
Process Flows
Data Conversion Process Flow
Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Risk & Control Matrices - RCMs
Deploy and Maintain Solutions RCM
This document outlines risks and controls common to the "deploy and maintain solutions" process in a risk control matrix...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Newsletters
Briefing the Board on IT Matters
In this issue of Board Perspectives: Risk Oversight, we outline three contexts for conducting IT briefings with the boar...
Subscriber Content
Newsletters
Top 10 Lessons Learned From Implementing COSO 2013
In this issue of The Bulletin, we share 10 lessons learned from COSO 2013 successful implementations from a variety of s...
Subscriber Content
Process Flows
IT Change Management Process Flow
To regulate information technology (IT) changes from beginning to end, it’s important to have an IT change management pr...
Subscriber Content
Guides
COSO Internal Controls Guide: Integrated Framework
Design and implement your organization’s internal controls with the COSO internal control framework included in this gui...
Subscriber Content
Protiviti Booklets
Guide to the Sarbanes-Oxley Act: IT Risks and Controls
In this booklet, we provide guidance to Section 404 compliance project teams on the consideration of information technol...
Subscriber Content
Policies & Procedures
User Authentication and Authorization Policy
The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Newsletters
Social Media: What It Means to Your Risk Profile
In this issue of Board Perspectives: Risk Oversight, we reveal 10 examples of business risks to consider associated with...
Subscriber Content
Process Flows
User Access Security Process Flow
This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Protiviti Booklets
Spreadsheet Risk Management: Frequently Asked Questions
This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content