IT Security

The following 189 items are listed by Content Data.

Blog

KnowledgeLeader's Top 10 Pages: May 2025

Download the 10 most frequently viewed audit tools and publications on KnowledgeLeader in May.1. Enterprise...
Mon, Jun 9, 2025
Policies & Procedures

Access Management Policy

Ensure secure access to company systems with this policy, detailing approval, monitoring and removal procedures for user...
Mon, Jun 2, 2025
Audit Programs

Database Audit Work Program

This tool includes two sample audit programs that provide steps organizations can take to perform a database administrat...
Mon, Jun 2, 2025
Articles

Information Security Risk Management Tools in the Air Traffic Management Domain: What Are Practitioners’ Needs?

Explore the gap between existing information security risk management tools and the actual needs of practitioners within...
Mon, Jun 2, 2025
Blog

New Content on KnowledgeLeader - 6/2/2025

ToolsThe following tools were published on KnowledgeLeader this week:Access Management PolicyGet compr...
Mon, Jun 2, 2025
Audit Programs

Security Management Audit Work Program

Evaluate your organization’s information security programs and identify vulnerabilities using this audit program sample.
Mon, Jun 2, 2025
Audit Programs

Desktop Management Audit Work Program

This document outlines steps to audit the process used to deploy software to desktop computers.
Mon, May 26, 2025
Blog

New Content on KnowledgeLeader - 5/12/2025

ToolsThe following tools were published on KnowledgeLeader this week:Entity-Level Controls Audit Work ...
Mon, May 12, 2025
Blog

New Content on KnowledgeLeader - 5/5/2025

ToolsThe following tools were published on KnowledgeLeader this week:Financial Policy Development Poli...
Mon, May 5, 2025
Audit Programs

Security Policy Review Audit Work Program

Gain insights on the adequacy and effectiveness of your organization's IT and data security measures and strengthen them...
Mon, May 5, 2025
Audit Programs

IT Physical Security Audit Work Program

This work program sample can be used to perform an audit of the physical security of your IT facilities.
Mon, Apr 14, 2025
Blog

New Content on KnowledgeLeader - 4/14/2025

ToolsThe following tools were published on KnowledgeLeader this week:Expense Reporting Policy Violatio...
Mon, Apr 14, 2025