IT Security

The following 210 items are listed by Content Data.
Articles

Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics

Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Mon, Jul 9, 2018
Newsletters

Oversight of Organizational Speed in the Digital Age

This issue explores 10 ideas on managing to the speed of business and its implications to board oversight.
Subscriber Content
Mon, Jul 2, 2018
Audit Reports

Security Assessment Audit Report

This sample report presents the results of an organization's information security audit.
Subscriber Content
Mon, Jun 25, 2018
Checklists & Questionnaires

System Privileges for Terminated Employees Checklist

This sample provides action steps to consider for protecting an organization’s critical systems and data and secure syst...
Subscriber Content
Mon, Jun 18, 2018
Protiviti Booklets

Internal Auditing Around the World: Volume 14

In Volume XIV of Protiviti’s Internal Auditing Around the World, we take a closer look at internal auditors’ challenges ...
Subscriber Content
Mon, Jun 4, 2018
Checklists & Questionnaires

Self-Assessment Questionnaire: IT Security Remediation

This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Mon, Apr 30, 2018
Protiviti Booklets

U.S. Anti-Money Laundering Requirements

This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Mon, Jan 29, 2018
Checklists & Questionnaires

Information Security Risk Assessment Questionnaire

This IT risk assessment questionnaire is designed to assist with reviewing and documenting the risk profile of your orga...
Subscriber Content
Mon, Dec 18, 2017
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

IT System Pre-Implementation Review Audit Report

This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Mon, Nov 27, 2017
Policies & Procedures

IT System Access and Re-Certification Policy

This sample establishes the standards and procedures for maintaining proper system access security at a company.
Subscriber Content
Mon, Aug 7, 2017