The following 108 items are listed by Content Data.
Policies & Procedures
Disaster Recovery Team Policy
Review and refine your organization’s disaster recovery procedures with the standards and guidelines in this policy samp...
Subscriber Content
Checklists & Questionnaires
System Implementation Process Questionnaire
Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Subscriber Content
Checklists & Questionnaires
Risk Assessment Questionnaire
Leverage these best-practice risk assessment questions to prepare for annual budgeting and business planning.
Subscriber Content
Audit Reports
IT Strategy Assessment Report
Communicate your organization’s IT infrastructure, policies and strategies with this comprehensive audit report sample.
Subscriber Content
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Subscriber Content
Audit Reports
IT Audit Update: Audit Committee Report
Transform your internal audit processes using our IT audit report template, ensuring comprehensive coverage of all criti...
Subscriber Content
Checklists & Questionnaires
Data Center General Controls Questionnaire
Use this questionnaire to meticulously evaluate your mainframe data center's operational controls and enhance security, ...
Subscriber Content
Audit Programs
System Management Risk Assessment and Control Audit Work Program
This work program will assist audit teams with identifying risks and related controls for logical security administratio...
Subscriber Content
Guides
IT General Controls Guide
Use the automation and standardization best practices in this guide to enhance IT processes and improve compliance.
Subscriber Content
Audit Programs
IT Application Management Audit Work Program
Enhance your IT application management audit capabilities with our comprehensive work program, tailored for risk assessm...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
IT Risk Management Best Practices
Investments in IT security and risk management continue to be on the rise. The main reason is that there’s ...