IT Risk

The following 133 items are listed by Content Data.
Policies & Procedures

IT and Telephony Systems Acceptable Use Policy

This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Mon, Jan 25, 2021
Policies & Procedures

Social Media Policy

This sample policy establishes standards and procedures employees should follow when engaging in social media networking...
Subscriber Content
Mon, Jan 25, 2021
Policies & Procedures

Spreadsheet Controls Policy

This tool contains two samples that outline policies and procedures to give guidance and ensure compliance related to fi...
Subscriber Content
Mon, Nov 9, 2020
Audit Reports

IT Asset Management Audit Report

This sample audit report can be used to improve and better understand an organization's IT asset management (ITAM) proce...
Subscriber Content
Mon, Aug 31, 2020
Audit Programs

Social Engineering Audit Work Program

This sample work program provides general steps organizations should follow when performing a social engineering audit.
Subscriber Content
Mon, Aug 24, 2020
Checklists & Questionnaires

Spreadsheet Risk Optimization Questionnaire

This questionnaire outlines the process to identify who manages critical spreadsheets within an organization and identif...
Subscriber Content
Mon, Aug 10, 2020
Policies & Procedures

Disaster Recovery Team Policy

This policy provides guidelines and standards an organization can follow when reviewing and improving its disaster recov...
Subscriber Content
Mon, Jun 22, 2020
Checklists & Questionnaires

Business Process Re-Engineering Questionnaire

This tool outlines questions to consider for measuring and restructuring organizations’ business processes.
Subscriber Content
Mon, May 4, 2020
Benchmarking Reports

A Look at Key IT Audit Issues: Six Focal Points for CAEs

This paper shares six items at the top of IT audit leaders’ growing priority lists that should resonate with CAEs, based...
Subscriber Content
Mon, Mar 16, 2020
Articles

Getting Ready for the Threat of Cyber Warfare

This article explains the recent rise in malicious cyber activity directed at U.S. industries and government agencies an...
Subscriber Content
Mon, Mar 16, 2020
Methodologies & Models

Project Management Methodology

This sample document can be used as a guide for understanding and reviewing an organization’s project management plan.
Subscriber Content
Mon, Jan 13, 2020
Articles

Emerging Technology Companies: Don’t Forget to Manage Security in the Cloud

This article discusses how organizations can improve their cloud security efforts and details the challenges associated ...
Subscriber Content
Mon, Nov 25, 2019