IT Security

The following 175 items are listed by Content Data.

Articles

Integration Prioritization Model for Identity Access Management

Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Mon, Oct 29, 2018
Checklists & Questionnaires

Privacy and Data Protection Questionnaire

Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Mon, Oct 8, 2018
Audit Reports

Security Policy and Procedure Evaluation Report: Communications

This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Mon, Sep 24, 2018
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018
Checklists & Questionnaires

Bank Controls: Information Systems Evaluation Tool

This tool helps to assist management in analyzing the effectiveness of the internal control structure over financial rep...
Subscriber Content
Mon, Jul 30, 2018
Newsletters

Oversight of Organizational Speed in the Digital Age

This issue explores 10 ideas on managing to the speed of business and its implications to board oversight.
Subscriber Content
Mon, Jul 2, 2018
Audit Reports

Security Assessment Audit Report

This sample report presents the results of an organization's information security audit.
Subscriber Content
Mon, Jun 25, 2018
Protiviti Booklets

Internal Auditing Around the World: Volume 14

In Volume XIV of Protiviti’s Internal Auditing Around the World, we take a closer look at internal auditors’ challenges ...
Subscriber Content
Mon, Jun 4, 2018
Checklists & Questionnaires

Self-Assessment Questionnaire: IT Security Remediation

This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Mon, Apr 30, 2018
Checklists & Questionnaires

Information Security Risk Assessment Questionnaire

This IT risk assessment questionnaire is designed to assist with reviewing and documenting the risk profile of your orga...
Subscriber Content
Mon, Dec 18, 2017
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017