The following 179 items are listed by Content Data.
Memos
Data Governance Audit Scoping Memo
This sample memo serves as a report of an internal audit function’s high-level assessment of the company’s data governan...
Subscriber Content
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Newsletters
Responsible Privacy: Is the Board Doing Its Part?
This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content
Checklists & Questionnaires
IT Application Security Questionnaire
This sample questionnaire is designed to monitor and enhance an organization's IT application security process.
Subscriber Content
Audit Reports
Security Policy and Procedures Evaluation Report: Controls and Responsibility
This sample audit report records the results of a security policies and procedures evaluation. The review illustrates se...
Subscriber Content
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Protiviti Booklets
FAQ: Understanding the General Data Protection Regulation
Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Checklists & Questionnaires
IT Employee Termination Checklist
This checklist outlines steps to follow when an IT employee stops working for a company.
Subscriber Content
Blog
What You Need to Know About GDPR Compliance
Are You Familiar With GDPR?The General Data Protection Regulation (GDPR) became effective May 25, 2018, and...
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Blog
Intellectual Property: Risks You Need to Know
Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Audit Reports
Security Policy and Procedure Evaluation Report: Application Development and Change Control
This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content