The following 138 items are listed by Content Data.
Audit Programs
UNIX Security Audit Work Program
This audit program outlines steps for reviewing the security of systems running the UNIX operating system.
Subscriber Content
Memos
Mobile Device Procurement Memo
This memo outlines an internal audit review of an organization's mobile device procurement process.
Subscriber Content
Risk & Control Matrices - RCMs
Define IT Strategy and Organization RCM
This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Process Flows
IT Change Management Process Flow
To regulate information technology (IT) changes from beginning to end, it’s important to have an IT change management pr...
Subscriber Content
Checklists & Questionnaires
Business Continuity Management Self-Assessment Questionnaire
This a self-assessment tool to use prior to a review of the business continuity management process. It gives the auditee...
Subscriber Content
Protiviti Booklets
Spreadsheet Risk Management: Frequently Asked Questions
This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content