IT Security

The following 179 items are listed by Content Data.

Memos

Data Governance Audit Scoping Memo

This sample memo serves as a report of an internal audit function’s high-level assessment of the company’s data governan...
Subscriber Content
Mon, Jun 1, 2020
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Wed, Feb 19, 2020
Newsletters

Responsible Privacy: Is the Board Doing Its Part?

This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content
Mon, Oct 28, 2019
Checklists & Questionnaires

IT Application Security Questionnaire

This sample questionnaire is designed to monitor and enhance an organization's IT application security process.
Subscriber Content
Mon, Aug 19, 2019
Audit Reports

Security Policy and Procedures Evaluation Report: Controls and Responsibility

This sample audit report records the results of a security policies and procedures evaluation. The review illustrates se...
Subscriber Content
Mon, Aug 5, 2019
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Protiviti Booklets

FAQ: Understanding the General Data Protection Regulation

Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Mon, May 13, 2019
Checklists & Questionnaires

IT Employee Termination Checklist

This checklist outlines steps to follow when an IT employee stops working for a company.
Subscriber Content
Mon, Apr 29, 2019
Blog

What You Need to Know About GDPR Compliance

Are You Familiar With GDPR?The General Data Protection Regulation (GDPR) became effective May 25, 2018, and...
Fri, Apr 5, 2019
Newsletters

Sharpening the Focus on Cybersecurity

This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Mon, Apr 1, 2019
Blog

Intellectual Property: Risks You Need to Know

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Fri, Feb 22, 2019
Audit Reports

Security Policy and Procedure Evaluation Report: Application Development and Change Control

This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content
Mon, Dec 31, 2018