The following 139 items are listed by Content Data.
Methodologies & Models
IT Support Service Desk Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT support service desk manageme...
Subscriber Content
Methodologies & Models
IT Program Portfolio Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT portfolio management process ...
Subscriber Content
Methodologies & Models
IT Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT management process and to ass...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Articles
Sustainability and the City: Reinventing the Future With High-Tech and Low-Tech Solutions
The COVID-19 pandemic provides an opportunity to reinvent cities as we know them through both high-tech and low-tech ini...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Articles
Flying Taxis and Digital Twin Cities
Petra Hurtado, research director at American Planning Association (APA), sat down with Protiviti to discuss where she se...
Subscriber Content
Methodologies & Models
Application Performance Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s application performance manageme...
Subscriber Content
Policies & Procedures
Internet Usage Policy
This tool includes four sample policies that define a company’s guidelines and procedures related to employee use of the...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Metadata Management RCM
This document outlines risks and controls common to metadata management in a risk control matrix (RCM) format.
Subscriber Content
Policies & Procedures
IT Equipment and Information Control Policy
This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Benchmarking Tools
Enterprise Security Key Performance Indicators (KPIs)
The purpose of this tool is to encourage dialog and help an organization assess the state of its network security. Areas...
Subscriber Content