IT Risk

The following 108 items are listed by Content Data.

Newsletters

Is Technical Debt Limiting Your Company’s Competitiveness?

This article presents options to address technical debt and create an organization’s overall road map that is tailored t...
Subscriber Content
Mon, Dec 3, 2018
Checklists & Questionnaires

General Threat Questionnaire

This sample checklist can be used for risk assessment to identify failure scenarios and the likelihood and severity of d...
Subscriber Content
Mon, Nov 19, 2018
Protiviti Booklets

Guide to Public Company Transformation

This guidance, now in its fourth edition, is designed to serve as a convenient and user-friendly resource that executive...
Subscriber Content
Mon, Sep 24, 2018
Audit Reports

Security Policy and Procedure Evaluation Report: Communications

This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Mon, Sep 24, 2018
Blog

Guide to Records Management

Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...
Thu, Jun 28, 2018
Blog

The Three Components of a Successful Systems Design

What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Thu, Jun 7, 2018
Blog

What is Transaction Authenticity?

What Is Transaction Authenticity?"Transaction authenticity" can be defined as the authentication of a party...
Thu, Feb 15, 2018
Newsletters

How Long Does It Take to Implement a Patch?

A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

IT Risk Assessment Audit Report

This risk assessment audit report outlines findings from a high-level IT risk assessment at a company.
Subscriber Content
Mon, Oct 23, 2017
Checklists & Questionnaires

IT Risk Assessment Questionnaire

This tool includes risk assessment questions for both IT management and executive IT management.
Subscriber Content
Mon, Sep 4, 2017
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Methodologies & Models

Protiviti Risk Model

The Protiviti Risk Model is a comprehensive organizing framework for defining and understanding potential business risks...
Subscriber Content
Mon, Jul 31, 2017