The following 106 items are listed by Content Data.
Audit Reports
Security Policy and Procedures Evaluation Report: Controls and Responsibility
This sample audit report records the results of a security policies and procedures evaluation. The review illustrates se...
Subscriber Content
Audit Reports
IT Strategy Gap Assessment Report
Strategic alignment between business goals and drivers and IT's goals and initiatives is a critical area for most organi...
Subscriber Content
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Checklists & Questionnaires
IT Capacity and Scalability Risk Questionnaire
This questionnaire outlines business risks and leading practices for both capacity and scalability in the IT business en...
Subscriber Content
Requests for Proposals - RFPs
Request for Qualifications: IT Professional Services Qualified Vendor List
This is a sample request for qualified IT services to help create an IT vendor list for multiple-year projects. The info...
Subscriber Content
Newsletters
The Top Risks for 2019
This issue summarizes five key takeaways from the 2019 Executive Perspectives on Top Risks survey and ranks the highest-...
Subscriber Content
Audit Reports
IT Governance Review Report
Objectives of this sample IT governance report include gaining a high-level understanding of the organization's IT gover...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Application Development and Change Control
This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content
Audit Reports
Business Continuity/Disaster Recovery Program Assessment Report
This audit report sample focuses on whether an appropriate enterprise-wide governance structure is in place to manage th...
Subscriber Content
Newsletters
Is Technical Debt Limiting Your Company’s Competitiveness?
This article presents options to address technical debt and create an organization’s overall road map that is tailored t...
Subscriber Content
Checklists & Questionnaires
General Threat Questionnaire
This sample checklist can be used for risk assessment to identify failure scenarios and the likelihood and severity of d...
Subscriber Content
Audit Reports
IT Risks and Controls Review Report
The objective of this audit report is to reduce the volume of controls across applications, infrastructure and IT proces...
Subscriber Content