The following 179 items are listed by Content Data.
Blog
What is Cloud Computing?
What is Cloud Computing?Cloud computing is defined as the use of a collection of services, applications, in...
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Communications
This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Checklists & Questionnaires
Bank Controls: Information Systems Evaluation Tool
This tool helps to assist management in analyzing the effectiveness of the internal control structure over financial rep...
Subscriber Content
Newsletters
Oversight of Organizational Speed in the Digital Age
This issue explores 10 ideas on managing to the speed of business and its implications to board oversight.
Subscriber Content
Audit Reports
Security Assessment Audit Report
This sample report presents the results of an organization's information security audit.
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 14
In Volume XIV of Protiviti’s Internal Auditing Around the World, we take a closer look at internal auditors’ challenges ...
Subscriber Content
Checklists & Questionnaires
Self-Assessment Questionnaire: IT Security Remediation
This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content