The following 106 items are listed by Content Data.
Audit Reports
IT Audit Update: Audit Committee Report
Utilize this audit report sample to evaluate your organization’s general computer control risks and report on the progre...
Subscriber Content
Checklists & Questionnaires
Data Center General Controls Questionnaire
Use this questionnaire to meticulously evaluate your mainframe data center's operational controls and enhance security, ...
Subscriber Content
Audit Programs
System Management Risk Assessment and Control Audit Work Program
This work program will assist audit teams with identifying risks and related controls for logical security administratio...
Subscriber Content
Guides
IT General Controls Guide
Use the automation and standardization best practices in this guide to enhance IT processes and improve compliance.
Subscriber Content
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
This comprehensive tool includes two sample IT disaster recovery plan checklists with best-practice questions for pre-pl...
Subscriber Content
Audit Programs
IT Application Management Audit Work Program
Enhance your IT application management audit capabilities with our comprehensive work program, tailored for risk assessm...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Blog
IT Risk Management Best Practices
Investments in IT security and risk management continue to be on the rise. The main reason is that there’s ...
Blog
New Content on KnowledgeLeader - 2/26/2024
ToolsThe following tools were published on KnowledgeLeader this week:Investment Income PolicyThis Inve...
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Policies & Procedures
Instant Messaging Policy
This policy outlines a set of procedures for the proper use of instant messaging by company employees.
Subscriber Content
Guides
Enterprise Risk Assessment Methodology for Internal Audit Plan Development Guide
This guide presents a detailed approach to enterprise risk assessment methodology for internal audit plan development.
Subscriber Content