The following 175 items are listed by Content Data.
Audit Reports
IT System Pre-Implementation Review Audit Report
This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Audit Reports
Cybersecurity Audit Report
This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Blog
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Blog
What Is Internal Audit’s Role in Cybersecurity?
Corporations are always thinking about how to protect assets. A few of the white-collar crimes compani...
Newsletters
Board Oversight of Cyber Risk
Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Memos
Enterprise Accounting System Post-Implementation Review Memo
This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Memos
Network Audit Management Memo
This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Risk & Control Matrices - RCMs
Application Control Review RCM
This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Memos
Scope of Application Security Memo
This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Audit Programs
Siebel/Oracle Information Security Audit Work Program
This audit program outlines procedures to evaluate six system control objectives.
Subscriber Content
Risk & Control Matrices - RCMs
Define IT Strategy and Organization RCM
This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content