The following 213 items are listed by Content Data.
Policies & Procedures
Systems Audit Logging and Monitoring Policy
This sample policy is designed to help organizations define and comply with system audit logging and monitoring requirem...
Subscriber Content
Benchmarking Tools
Transaction Authority Risk Key Performance Indicators (KPIs)
This tool contains performance measures and questions an organization can use to enforce and ensure the validity of tran...
Subscriber Content
Audit Programs
Application Security Review and Testing Audit Work Program
This tool includes two sample audit programs that provide steps organizations can take to facilitate an application secu...
Subscriber Content
Policies & Procedures
Separation of Duties Policy
In this sample policy, we outline the standards for applying separation of duties to protect a company’s information ass...
Subscriber Content
Policies & Procedures
Telecommunication Usage Policy
This sample policy defines guidelines and procedures organizations should follow when using telecommunications systems.
Subscriber Content
Newsletters
Ransomware: Preventing an Attack and Responding to and Recovering From an Attack
This issue of The Bulletin focuses on the six components of cyber resilience and provides countermeasures businesses can...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy: Manage Security Configurations RCM
This document outlines risks and controls common to managing security configurations during the security and privacy man...
Subscriber Content
Policies & Procedures
Information Security Management System Policy
This policy establishes the scope of a company's information security management system and characterizes the interfaces...
Subscriber Content
Benchmarking Tools
Enterprise Security Key Performance Indicators (KPIs)
The purpose of this tool is to encourage dialog and help an organization assess the state of its network security. Areas...
Subscriber Content
Policies & Procedures
Physical Security Standard Policy
The purpose of this policy is to create and maintain a physically secure environment that protects company property and ...
Subscriber Content
Audit Programs
Enterprise Resource Planning Security Audit Work Program
In this work program sample, we list general best-practice steps for the enterprise resource planning security process.
Subscriber Content
Articles
Realities of Crisis, Regulatory Landscape Call for Re-Imagining Resilience and Curbing Complacency
Here, we discuss several critical factors for financial services organizations to consider with regard to their future o...
Subscriber Content