IT Risk

The following 107 items are listed by Content Data.

Policies & Procedures

IT Contingency Planning Policy

The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Mon, May 16, 2022
Risk & Control Matrices - RCMs

Manage Data Center Operations: Reference and Master Data Management RCM

This document outlines risks and controls common to reference and master data management in a risk control matrix (RCM) ...
Subscriber Content
Mon, Dec 20, 2021
Performer Profiles

FIS: Leveraging the Power of Emerging Technology for Greater Assurance

In this profile, FIS Chief Audit Executive John Eagle shares how his team utilizes advanced technology to focus on ongoi...
Subscriber Content
Mon, Nov 8, 2021
Benchmarking Tools

Data Integrity Risk Key Performance Indicators (KPIs)

What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Mon, May 10, 2021
Benchmarking Tools

Records Management Risk Key Performance Indicators (KPIs)

This tool contains key performance indicators and questions an organization can use to evaluate its record management pr...
Subscriber Content
Mon, May 3, 2021
Benchmarking Tools

System Design Risk Key Performance Indicators (KPIs)

This tool includes key performance indicators and questions an organization should use to evaluate and manage its system...
Subscriber Content
Mon, Apr 26, 2021
Memos

IT Network Security Scope Memo

The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Mon, Apr 19, 2021
Benchmarking Tools

IT Performance Risk Key Performance Indicators (KPIs)

This tool outlines leading practices and questions for organizations to consider when evaluating IT performance.
Subscriber Content
Mon, Apr 5, 2021
Benchmarking Tools

Enterprise Risk Management Key Performance Indicators (KPIs)

The key performance indicators and questions included in this tool can be used by organizations looking to evaluate thei...
Subscriber Content
Mon, Mar 29, 2021
Policies & Procedures

Connection to Untrusted Network Standard Policy

This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Mon, Mar 8, 2021
Policies & Procedures

IT Auditing and Logging Standard Policy

The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Mon, Feb 8, 2021
Policies & Procedures

IT and Telephony Systems Acceptable Use Policy

This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Mon, Jan 25, 2021