The following 134 items are listed by Content Data.
Articles
How Firms Can Tackle Technology Risk Blind Spots to Build Resilience
Protiviti’s Ewen Ferguson and Hirun Tantirigama identify common critical technology risks and illustrate what organizati...
Subscriber Content
Audit Programs
Intranet Audit Work Program
This work program sample highlights general steps an organization should follow when performing an intranet audit.
Subscriber Content
Benchmarking Tools
Data Integrity Risk Key Performance Indicators (KPIs)
What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Benchmarking Tools
Records Management Risk Key Performance Indicators (KPIs)
This tool contains key performance indicators and questions an organization can use to evaluate its record management pr...
Subscriber Content
Benchmarking Tools
System Design Risk Key Performance Indicators (KPIs)
This tool includes key performance indicators and questions an organization should use to evaluate and manage its system...
Subscriber Content
Policies & Procedures
Enterprise Assessment and Monitoring Policy
The purpose of this policy is to develop a consistent method for scheduling and managing company IT security assessment ...
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Benchmarking Tools
IT Performance Risk Key Performance Indicators (KPIs)
This tool outlines leading practices and questions for organizations to consider when evaluating IT performance.
Subscriber Content
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Policies & Procedures
IT Auditing and Logging Standard Policy
The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Policies & Procedures
IT and Telephony Systems Acceptable Use Policy
This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Policies & Procedures
Social Media Policy
This sample policy establishes standards and procedures employees should follow when engaging in social media networking...
Subscriber Content