IT Risk

The following 107 items are listed by Content Data.

Policies & Procedures

IT Project Management and SDLC Policy

The purpose of this policy is to establish requirements to consistently govern and manage IT projects, including acquisi...
Subscriber Content
Mon, Jun 5, 2023
Policies & Procedures

IT Governance Policy

Use the established requirements in this policy to oversee information technology resources, achieve company business ob...
Subscriber Content
Mon, May 15, 2023
Guides

IT and Business Risk Alignment Guide

This sample tool can be used as a guide for understanding and assessing an organization’s IT and business risk alignment...
Subscriber Content
Mon, May 8, 2023
Articles

It's a Brave, New, Immersive World With Media and Metaverse Expert Luke Franks

A conversation between content creator Luke Franks and Protiviti’s Joe Kornik about the metaverse and its potential impa...
Subscriber Content
Mon, Apr 17, 2023
Articles

High Touch, Not High Tech

When envisioning the cities of the future, startups and policymakers need to remember the most important factor: quality...
Subscriber Content
Mon, Mar 13, 2023
Guides

IT Controls and Governance Guide

Strengthen IT controls and governance to align IT with business goals, manage risks effectively, and drive measurable va...
Subscriber Content
Mon, Feb 6, 2023
Methodologies & Models

IT Program and Project Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT program and project managemen...
Subscriber Content
Mon, Dec 19, 2022
Blog

What Is IT Risk and How Should You Manage It?

What Is IT Risk?Information technology (IT) risk is any potential threat to business data, critical systems...
Thu, Sep 15, 2022
Methodologies & Models

IT General Controls Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Mon, Sep 12, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022
Newsletters

Get Into the Quantum Game: Use Cases Are Emerging

In this issue of Board Perspectives, we suggest four ways boards can start planning for quantum computing.
Subscriber Content
Mon, Aug 1, 2022
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Mon, Jul 4, 2022