The following 151 items are listed by Content Data.
Policies & Procedures
Network Security Policy
Our Network Security Policy is designed to help companies protect their user accounts, corporate data and intellectual p...
Policies & Procedures
Corporate Website Policy
Ensure that your company website reflects a consistent corporate image that preserves and builds the value of the corpor...
Articles
Digitizing Democracy: Former Estonian President on How E-Government Saved a Struggling Country
The former president of Estonia describes the effort to digitize government services and lift the country out of Soviet ...
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Audit Reports
Expenditure Process Review Report
Our Expenditure Process Review Report includes a future-state design to consider when reviewing your organization’s expe...
Audit Programs
System Post-Implementation Audit Work Program
Organizations can use the three audit program samples in this tool to assess the usage, supporting information technolog...
Policies & Procedures
IT System Development Lifecycle (SDLC) Methodology Policy
This policy defines the methodologies and processes for the effective implementation of application development projects...
Policies & Procedures
IT Support Policy
Explore our detailed IT support policy for employees, covering request submission, urgent assistance after hours and iss...
Charters
IT Project Charter
This sample establishes guidelines for creating an IT project charter.
Articles
Aiming for Impact, Ripple CBDC Lead Says Proliferation of Digital Currencies Not to Be Feared
Ripple CBCD Senior Director of Client Solutions and Delivery Ross Edwards and Protiviti’s Lata Varghese discuss technolo...
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT asset management process and ...
Subscriber Content
Articles
Mastering the Interplay: The Role and Culture of a Cyber Physical Security (CPS) Professional in Global Cybersecurity Teams
This article explores the dynamic world of cyber physical security professionals within global cybersecurity frameworks.