The following 107 items are listed by Content Data.
Audit Programs
IT Strategy Management Audit Work Program
Evaluate the effectiveness of your organization's IT strategy and its alignment with business objectives.
Audit Programs
Security Management Audit Work Program
Evaluate your organization’s information security programs and identify vulnerabilities using this audit program sample.
Audit Programs
IT Data Management Audit Work Program
Improve your IT resilience and security posture with our IT Data Management Audit Work Program, evaluating data manageme...
Audit Programs
IT General Controls Audit Work Program
Ensure that all aspects of IT security, configuration management, change management and operational processes are adequa...
Audit Programs
IT Organization Audit Work Program
Evaluate the effectiveness and efficiency of your IT operations, ensuring alignment with business objectives while ident...
Blog
Topic Spotlight: Risk Assessment
Browse our Risk Assessment Topic area for expert guidance, customizable tools and actionable best practices...
Policies & Procedures
Spreadsheet Controls Policy
Ensure compliance and enhance financial reporting accuracy for critical spreadsheets in alignment with SOX guidelines wi...
Policies & Procedures
Disaster Recovery Team Policy
Review and refine your organization’s disaster recovery procedures with the standards and guidelines in this policy samp...
Checklists & Questionnaires
System Implementation Process Questionnaire
Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Checklists & Questionnaires
Risk Assessment Questionnaire
Leverage these best-practice risk assessment questions to prepare for annual budgeting and business planning.
Audit Reports
IT Strategy Assessment Report
Communicate your organization’s IT infrastructure, policies and strategies with this comprehensive audit report sample.
Subscriber Content
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Subscriber Content