IT Security

The following 210 items are listed by Content Data.
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Policies & Procedures

Patient Admission Policy

This sample policy provides a consistent, standardized and proficient method for the admission of patients.
Subscriber Content
Mon, May 29, 2017
Benchmarking Tools

External Access Risk Key Performance Indicators (KPIs)

This tool outlines the business risks associated with inappropriate access to systems, data or information and suggests ...
Subscriber Content
Mon, May 22, 2017
Newsletters

Board Oversight of Cyber Risk

Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Mon, May 1, 2017
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Policies & Procedures

Server Configuration Policy

This policy defines the standard security settings utilized on a company's servers.
Subscriber Content
Mon, Oct 17, 2016
Memos

Enterprise Accounting System Post-Implementation Review Memo

This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Mon, Sep 12, 2016
Memos

Network Audit Management Memo

This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Mon, Aug 22, 2016
Risk & Control Matrices - RCMs

Application Control Review RCM

This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Mon, Aug 15, 2016
Memos

Scope of Application Security Memo

This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Mon, Aug 15, 2016
Audit Programs

Siebel/Oracle Information Security Audit Work Program

This audit program outlines procedures to evaluate six system control objectives.
Subscriber Content
Mon, Jun 27, 2016
Risk & Control Matrices - RCMs

Define IT Strategy and Organization RCM

This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Mon, Feb 29, 2016