IT Risk

The following 105 items are listed by Content Data.

Methodologies & Models

IT Program and Project Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT program and project managemen...
Subscriber Content
Mon, Dec 19, 2022
Blog

What Is IT Risk and How Should You Manage It?

What Is IT Risk?Information technology (IT) risk is any potential threat to business data, critical systems...
Thu, Sep 15, 2022
Methodologies & Models

IT General Controls Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Mon, Sep 12, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022
Newsletters

Get Into the Quantum Game: Use Cases Are Emerging

In this issue of Board Perspectives, we suggest four ways boards can start planning for quantum computing.
Subscriber Content
Mon, Aug 1, 2022
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Mon, Jul 4, 2022
Policies & Procedures

IT Contingency Planning Policy

The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Mon, May 16, 2022
Risk & Control Matrices - RCMs

Manage Data Center Operations: Reference and Master Data Management RCM

This document outlines risks and controls common to reference and master data management in a risk control matrix (RCM) ...
Subscriber Content
Mon, Dec 20, 2021
Performer Profiles

FIS: Leveraging the Power of Emerging Technology for Greater Assurance

In this profile, FIS Chief Audit Executive John Eagle shares how his team utilizes advanced technology to focus on ongoi...
Subscriber Content
Mon, Nov 8, 2021
Benchmarking Tools

Data Integrity Risk Key Performance Indicators (KPIs)

What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Mon, May 10, 2021
Benchmarking Tools

Records Management Risk Key Performance Indicators (KPIs)

This tool contains key performance indicators and questions an organization can use to evaluate its record management pr...
Subscriber Content
Mon, May 3, 2021
Benchmarking Tools

System Design Risk Key Performance Indicators (KPIs)

This tool includes key performance indicators and questions an organization should use to evaluate and manage its system...
Subscriber Content
Mon, Apr 26, 2021
Memos

IT Network Security Scope Memo

The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Mon, Apr 19, 2021
Benchmarking Tools

IT Performance Risk Key Performance Indicators (KPIs)

This tool outlines leading practices and questions for organizations to consider when evaluating IT performance.
Subscriber Content
Mon, Apr 5, 2021
Benchmarking Tools

Enterprise Risk Management Key Performance Indicators (KPIs)

The key performance indicators and questions included in this tool can be used by organizations looking to evaluate thei...
Subscriber Content
Mon, Mar 29, 2021
Policies & Procedures

Connection to Untrusted Network Standard Policy

This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Mon, Mar 8, 2021
Policies & Procedures

IT Auditing and Logging Standard Policy

The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Mon, Feb 8, 2021
Policies & Procedures

IT and Telephony Systems Acceptable Use Policy

This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Mon, Jan 25, 2021
Audit Reports

IT Asset Management Audit Report

This sample audit report can be used to improve and better understand an organization's IT asset management (ITAM) proce...
Subscriber Content
Mon, Aug 31, 2020
Checklists & Questionnaires

Spreadsheet Risk Optimization Questionnaire

This questionnaire outlines the process to identify who manages critical spreadsheets within an organization and identif...
Subscriber Content
Mon, Aug 10, 2020
Checklists & Questionnaires

Business Process Re-Engineering Questionnaire

This tool outlines questions to consider for measuring and restructuring organizations’ business processes.
Subscriber Content
Mon, May 4, 2020
Blog

What You Need to Build Remarkable Partnerships With the IT Organization

The strength of the partnership between IT audit and the IT organization is a significant differe...
Fri, Mar 27, 2020
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Tue, Feb 18, 2020
Methodologies & Models

Project Management Methodology

This sample document can be used as a guide for understanding and reviewing an organization’s project management plan.
Subscriber Content
Mon, Jan 13, 2020