The following 105 items are listed by Content Data.
Methodologies & Models
IT Program and Project Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT program and project managemen...
Subscriber Content
Blog
What Is IT Risk and How Should You Manage It?
What Is IT Risk?Information technology (IT) risk is any potential threat to business data, critical systems...
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Newsletters
Get Into the Quantum Game: Use Cases Are Emerging
In this issue of Board Perspectives, we suggest four ways boards can start planning for quantum computing.
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Policies & Procedures
IT Contingency Planning Policy
The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Reference and Master Data Management RCM
This document outlines risks and controls common to reference and master data management in a risk control matrix (RCM) ...
Subscriber Content
Performer Profiles
FIS: Leveraging the Power of Emerging Technology for Greater Assurance
In this profile, FIS Chief Audit Executive John Eagle shares how his team utilizes advanced technology to focus on ongoi...
Subscriber Content
Benchmarking Tools
Data Integrity Risk Key Performance Indicators (KPIs)
What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Benchmarking Tools
Records Management Risk Key Performance Indicators (KPIs)
This tool contains key performance indicators and questions an organization can use to evaluate its record management pr...
Subscriber Content
Benchmarking Tools
System Design Risk Key Performance Indicators (KPIs)
This tool includes key performance indicators and questions an organization should use to evaluate and manage its system...
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Benchmarking Tools
IT Performance Risk Key Performance Indicators (KPIs)
This tool outlines leading practices and questions for organizations to consider when evaluating IT performance.
Subscriber Content
Benchmarking Tools
Enterprise Risk Management Key Performance Indicators (KPIs)
The key performance indicators and questions included in this tool can be used by organizations looking to evaluate thei...
Subscriber Content
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Policies & Procedures
IT Auditing and Logging Standard Policy
The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Policies & Procedures
IT and Telephony Systems Acceptable Use Policy
This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Audit Reports
IT Asset Management Audit Report
This sample audit report can be used to improve and better understand an organization's IT asset management (ITAM) proce...
Subscriber Content
Checklists & Questionnaires
Spreadsheet Risk Optimization Questionnaire
This questionnaire outlines the process to identify who manages critical spreadsheets within an organization and identif...
Subscriber Content
Checklists & Questionnaires
Business Process Re-Engineering Questionnaire
This tool outlines questions to consider for measuring and restructuring organizations’ business processes.
Subscriber Content
Blog
What You Need to Build Remarkable Partnerships With the IT Organization
The strength of the partnership between IT audit and the IT organization is a significant differe...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Methodologies & Models
Project Management Methodology
This sample document can be used as a guide for understanding and reviewing an organization’s project management plan.
Subscriber Content