IT Security

The following 175 items are listed by Content Data.

Audit Reports

IT System Pre-Implementation Review Audit Report

This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Mon, Nov 27, 2017
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Blog

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Mon, Jul 17, 2017
Blog

What Is Internal Audit’s Role in Cybersecurity?

Corporations are always thinking about how to protect assets. A few of the white-collar crimes compani...
Fri, Jun 9, 2017
Newsletters

Board Oversight of Cyber Risk

Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Mon, May 1, 2017
Memos

Enterprise Accounting System Post-Implementation Review Memo

This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Mon, Sep 12, 2016
Memos

Network Audit Management Memo

This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Mon, Aug 22, 2016
Risk & Control Matrices - RCMs

Application Control Review RCM

This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Mon, Aug 15, 2016
Memos

Scope of Application Security Memo

This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Mon, Aug 15, 2016
Audit Programs

Siebel/Oracle Information Security Audit Work Program

This audit program outlines procedures to evaluate six system control objectives.
Subscriber Content
Mon, Jun 27, 2016
Risk & Control Matrices - RCMs

Define IT Strategy and Organization RCM

This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Mon, Feb 29, 2016
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015