The following 105 items are listed by Content Data.
Checklists & Questionnaires
Quantum Computing Questionnaire
Prepare your business for the quantum era with insights on leveraging cutting-edge technology to solve complex problems ...
Checklists & Questionnaires
Cybersecurity Oversight Questionnaire
Enhance cybersecurity oversight with essential questions and strategies to improve detection, response and board account...
Audit Programs
Network Infrastructure Audit Work Program
Implement a proactive network audit to assess risks, enhance security measures and ensure compliance with industry stand...
Audit Programs
System Pre-Implementation Audit Work Program
Achieve successful system implementations with our guidance on evaluating project management strategies, testing protoco...
Risk & Control Matrices - RCMs
Manage Information Technology Risk Control Matrix (RCM)
Identify and assess common IT risks, such as unauthorized data access, with this RCM sample.
Subscriber Content
Articles
Exploring the Convergence of Digital Finance, ESG Assurance, and IT Risk Management: A Bibliometric Review of Audit-Focused Research Streams
Explore the intersection of digital finance, ESG assurance and IT risk management, including trends, gaps and future res...
Audit Programs
IT Data Management Audit Work Program
Identify, assess and strengthen IT data management controls for ensuring data security, integrity and regulatory complia...
Audit Programs
Disaster Recovery Audit Work Program
Streamline your organization's resilience with this tool for auditing and enhancing disaster recovery plans.
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
Evaluate your existing IT disaster recovery plan with best-practice questions for pre-planning, plan development and tes...
Methodologies & Models
IT Capabilities CMM
Elevate your IT governance and maturity, strategic alignment, and operational excellence with our comprehensive IT Capab...
Subscriber Content
Blog
Topic Spotlight: Risk Assessment
Risk assessment is a critical process for companies, yet it comes with inherent challenges that can comprom...
Audit Programs
Security Management Audit Work Program
Evaluate your organization’s information security programs and identify vulnerabilities using this audit program sample.
Subscriber Content