The following 189 items are listed by Content Data.
Blog
KnowledgeLeader's Top 10 Pages: May 2025
Download the 10 most frequently viewed audit tools and publications on KnowledgeLeader in May.1. Enterprise...
Policies & Procedures
Access Management Policy
Ensure secure access to company systems with this policy, detailing approval, monitoring and removal procedures for user...
Audit Programs
Database Audit Work Program
This tool includes two sample audit programs that provide steps organizations can take to perform a database administrat...
Articles
Information Security Risk Management Tools in the Air Traffic Management Domain: What Are Practitioners’ Needs?
Explore the gap between existing information security risk management tools and the actual needs of practitioners within...
Blog
New Content on KnowledgeLeader - 6/2/2025
ToolsThe following tools were published on KnowledgeLeader this week:Access Management PolicyGet compr...
Audit Programs
Security Management Audit Work Program
Evaluate your organization’s information security programs and identify vulnerabilities using this audit program sample.
Audit Programs
Desktop Management Audit Work Program
This document outlines steps to audit the process used to deploy software to desktop computers.
Blog
New Content on KnowledgeLeader - 5/12/2025
ToolsThe following tools were published on KnowledgeLeader this week:Entity-Level Controls Audit Work ...
Blog
New Content on KnowledgeLeader - 5/5/2025
ToolsThe following tools were published on KnowledgeLeader this week:Financial Policy Development Poli...
Audit Programs
Security Policy Review Audit Work Program
Gain insights on the adequacy and effectiveness of your organization's IT and data security measures and strengthen them...
Audit Programs
IT Physical Security Audit Work Program
This work program sample can be used to perform an audit of the physical security of your IT facilities.
Blog
New Content on KnowledgeLeader - 4/14/2025
ToolsThe following tools were published on KnowledgeLeader this week:Expense Reporting Policy Violatio...