IT Risk

The following 106 items are listed by Content Data.
Protiviti Booklets

Guide to Public Company Transformation

This guidance, now in its fourth edition, is designed to serve as a convenient and user-friendly resource that executive...
Subscriber Content
Mon, Sep 24, 2018
Audit Reports

Security Policy and Procedure Evaluation Report: Communications

This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Mon, Sep 24, 2018
Blog

Guide to Records Management

Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...
Thu, Jun 28, 2018
Blog

The Three Components of a Successful Systems Design

What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Wed, Jun 6, 2018
Blog

What is Transaction Authenticity?

What Is Transaction Authenticity?"Transaction authenticity" can be defined as the authentication of a party...
Thu, Feb 15, 2018
Newsletters

How Long Does It Take to Implement a Patch?

A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

IT Risk Assessment Audit Report

This risk assessment audit report outlines findings from a high-level IT risk assessment at a company.
Subscriber Content
Mon, Oct 23, 2017
Checklists & Questionnaires

IT Risk Assessment Questionnaire

This tool includes risk assessment questions for both IT management and executive IT management.
Subscriber Content
Mon, Sep 4, 2017
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Methodologies & Models

Protiviti Risk Model

The Protiviti Risk Model is a comprehensive organizing framework for defining and understanding potential business risks...
Subscriber Content
Mon, Jul 31, 2017
Benchmarking Tools

External Access Risk Key Performance Indicators (KPIs)

This tool outlines the business risks associated with inappropriate access to systems, data or information and suggests ...
Subscriber Content
Mon, May 22, 2017
Newsletters

Improving Your Company’s Risk Assessment Process

This issue of Board Perspectives summarizes 10 practices that will help management and directors maximize the value deri...
Subscriber Content
Mon, Apr 24, 2017