IT Security

The following 210 items are listed by Content Data.
Audit Programs

System Backup Review Audit Work Program

The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Mon, Oct 26, 2015
Audit Programs

Software Licensure Compliance Audit Work Program

This sample compliance work program can be modified for scope considerations that will depend on the extent of the softw...
Subscriber Content
Mon, Jun 22, 2015
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015
Audit Programs

IT Data Management Audit Work Program

This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Mon, May 25, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Audit Programs

Desktop Management Audit Work Program

This document outlines steps to audit the process used to deploy software to desktop computers.
Subscriber Content
Mon, Apr 20, 2015
Newsletters

Managing Cyber Threats with Confidence

This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Mon, Apr 13, 2015
Audit Programs

IT Application Management Audit Work Program

This sample IT application management audit work program is designed around key risk indicators of potential problems.
Subscriber Content
Mon, Apr 6, 2015
Newsletters

Managing Cybersecurity Risk

In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Mon, Jun 10, 2013
Policies & Procedures

System, Database and Application Administrator Policy

The purpose of this policy is to define the roles, activities, and responsibilities of administrators with regard to acc...
Subscriber Content
Mon, Oct 29, 2012
Policies & Procedures

User Authentication and Authorization Policy

The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Mon, Oct 29, 2012
Policies & Procedures

Systems Development Lifecycle (SDLC) and Change Management Policy

This sample outlines a set of policies and procedures designed to provide an orderly process in which changes to a compa...
Subscriber Content
Mon, Oct 22, 2012