The following 106 items are listed by Content Data.
Policies & Procedures
User Authentication and Authorization Policy
The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Policies & Procedures
User Malicious Software Policy
The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Newsletters
Social Media: What It Means to Your Risk Profile
In this issue of Board Perspectives: Risk Oversight, we reveal 10 examples of business risks to consider associated with...
Subscriber Content
Newsletters
Ten Questions the Board Should Ask
This issue of Board Perspectives: Risk Oversight provides 10 key questions for boards to consider as they plan their 201...
Subscriber Content
Newsletters
Should the Board Have a Separate Risk Committee?
This issue of Board Perspectives: Risk Oversight explores how the board’s overall risk oversight responsibilities should...
Subscriber Content
Newsletters
Risk Management: A Look Back and a Look Forward
In this issue of The Bulletin, we look at how risk management has evolved over the past 25 years and some of the lessons...
Subscriber Content
Newsletters
Setting the 2011 Audit Committee Agenda
Explore our strategies for a proactive audit committee agenda to enhance risk management, ensure compliance and drive su...
Subscriber Content
Protiviti Booklets
Spreadsheet Risk Management: Frequently Asked Questions
This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content
Newsletters
Technology Risks and Controls: What You Need to Know
In this issue of The Bulletin, we focus on the relevance of IT risks and controls to a company’s meeting the internal co...
Subscriber Content
Blog
IT Audit Risk Management Best Practices
An IT audit is a structured review of IT infrastructure, applications, policies and operations that en...