The following 168 items are listed by Content Data.
Articles
From Gridlock to Governance: The Case for a High-Performing Architecture Review Board
Maximize your technology budgets by implementing effective architectural governance to reduce technical debt and drive s...
Checklists & Questionnaires
Data Center General Controls Questionnaire
Assess and strengthen your organization’s Data Center security, operations and compliance measures with this questionnai...
Blog
Topic Spotlight: Audit Testing
Audit testing presents several risks for companies, primarily related to the possibility of material missta...
Blog
IT Controls Risk Management: A Strategic Guide
Strengthening IT Controls in a Complex Risk EnvironmentEffective IT controls underpin organizational s...
Policies & Procedures
IT Security Policy
Download our IT Security Risk Policy to protect critical assets, ensure compliance, and define roles and responsibilitie...
Blog
KnowledgeLeader’s Top 25 of 2025
As another year comes to a close, it’s the perfect time to reflect on the standout tools and publications t...
Audit Programs
Firewall Audit Work Program
Strengthen your network defenses by following our step-by-step firewall audit program for effective security, compliance...
Articles
The Cybersecurity Blind Spot in SOX Compliance and How to Fix It
Enhance cybersecurity fundamentals to combat ransomware and comply with new SEC disclosure rules.
Checklists & Questionnaires
Service-Level Agreement Questionnaire
Optimize your service-level agreements with this questionnaire covering key requirements, escalation actions and IT perf...
Audit Programs
Corporate Intranet Security Audit Work Program
Enhance corporate intranet security by focusing on access controls, secure coding practices and data protection measures...
Audit Programs
PCI Review Audit Work Program
Achieve PCI DSS compliance by implementing secure data practices, conducting evidence-based reviews and protecting cardh...
Audit Programs
IT Continuity Review Audit Work Program
Leverage this audit tool to identify gaps and implement best practices for effective IT continuity and business resilien...
Subscriber Content