The following 108 items are listed by Content Data.
Blog
What You Need to Build Remarkable Partnerships With the IT Organization
The strength of the partnership between IT audit and the IT organization is a significant differe...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Methodologies & Models
Project Management Methodology
This sample document can be used as a guide for understanding and reviewing an organization’s project management plan.
Subscriber Content
Methodologies & Models
Staffing and Professional Services Risk Model
This staffing and professional services risk model focuses on risks that are inherent to the organization from the envir...
Subscriber Content
Audit Reports
Security Policy and Procedures Evaluation Report: Controls and Responsibility
This sample audit report records the results of a security policies and procedures evaluation. The review illustrates se...
Subscriber Content
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Checklists & Questionnaires
IT Capacity and Scalability Risk Questionnaire
This questionnaire outlines business risks and leading practices for both capacity and scalability in the IT business en...
Subscriber Content
Requests for Proposals - RFPs
Request for Qualifications: IT Professional Services Qualified Vendor List
This is a sample request for qualified IT services to help create an IT vendor list for multiple-year projects. The info...
Subscriber Content
Newsletters
The Top Risks for 2019
This issue summarizes five key takeaways from the 2019 Executive Perspectives on Top Risks survey and ranks the highest-...
Subscriber Content
Audit Reports
IT Governance Review Report
Objectives of this sample IT governance report include gaining a high-level understanding of the organization's IT gover...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Application Development and Change Control
This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content
Audit Reports
Business Continuity/Disaster Recovery Program Assessment Report
This audit report sample focuses on whether an appropriate enterprise-wide governance structure is in place to manage th...
Subscriber Content