The following 106 items are listed by Content Data.
Checklists & Questionnaires
Cybersecurity Oversight Questionnaire
Enhance cybersecurity oversight with essential questions and strategies to improve detection, response and board account...
Audit Programs
System Pre-Implementation Audit Work Program
Achieve successful system implementations with our guidance on evaluating project management strategies, testing protoco...
Articles
Exploring the Convergence of Digital Finance, ESG Assurance, and IT Risk Management: A Bibliometric Review of Audit-Focused Research Streams
Explore the intersection of digital finance, ESG assurance and IT risk management, including trends, gaps and future res...
Risk & Control Matrices - RCMs
Manage Information Technology Risk Control Matrix (RCM)
Identify and assess common IT risks, such as unauthorized data access, with this RCM sample.
Subscriber Content
Audit Programs
IT Data Management Audit Work Program
Identify, assess and strengthen IT data management controls for ensuring data security, integrity and regulatory complia...
Audit Programs
Disaster Recovery Audit Work Program
Streamline your organization's resilience with this tool for auditing and enhancing disaster recovery plans.
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
Evaluate your existing IT disaster recovery plan with best-practice questions for pre-planning, plan development and tes...
Methodologies & Models
IT Capabilities CMM
Elevate your IT governance and maturity, strategic alignment, and operational excellence with our comprehensive IT Capab...
Subscriber Content
Blog
Topic Spotlight: Risk Assessment
Risk assessment is a critical process for companies, yet it comes with inherent challenges that can comprom...
Audit Reports
IT Risks and Controls Review Report
Recommendations for reducing the volume of controls across applications, infrastructure and IT processes to improve cons...
Subscriber Content
Audit Programs
Security Management Audit Work Program
Evaluate your organization’s information security programs and identify vulnerabilities using this audit program sample.
Subscriber Content
Audit Programs
IT Strategy Management Audit Work Program
Evaluate the effectiveness of your organization's IT strategy and its alignment with business objectives.
Subscriber Content