IT Security

The following 179 items are listed by Content Data.

Audit Reports

Data Privacy Maturity Audit Report

Assess and improve your organization's data privacy practices, ensure regulatory compliance, and mitigate risks related ...
Subscriber Content
Mon, Mar 17, 2025
Policies & Procedures

IT Change Management Policy

Ensure that modifications to IT assets are consistently recorded, assessed, authorized, tested and implemented in a syst...
Subscriber Content
Mon, Mar 10, 2025
Audit Programs

System Backup Review Audit Work Program

Ensure that your organization's backup procedures are robust, compliant and aligned with best practices and safeguard cr...
Subscriber Content
Mon, Mar 10, 2025
Blog

New Content on KnowledgeLeader - 3/3/2025

ToolsThe following tools were published on KnowledgeLeader this week:Disaster Recovery Team PolicyCrea...
Mon, Mar 3, 2025
Articles

Privacy, Data Protection and Cybersecurity in the Boardroom With Dr. Gregg Li

Dr. Gregg Li, governance architect, discusses technology, governance and the transformation of boards.
Subscriber Content
Mon, Mar 3, 2025
Risk & Control Matrices - RCMs

Manage Security and Privacy - Administer Security: IT Physical Security RCM

Manage and mitigate security and privacy risks in alignment with your organization's evolving operational needs.
Subscriber Content
Mon, Mar 3, 2025
Policies & Procedures

Social Media Policy

Ensure that all team members are aligned with your company's values and legal requirements when they represent or refer ...
Subscriber Content
Mon, Feb 10, 2025
Checklists & Questionnaires

System Privileges for Terminated Employees Checklist

Take immediate action steps to protect your organization’s critical systems and data and secure systems in the event of ...
Subscriber Content
Mon, Feb 10, 2025
Checklists & Questionnaires

System Implementation Process Questionnaire

Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Subscriber Content
Mon, Feb 3, 2025
Policies & Procedures

IT Personnel Security Policy

Define standards and procedures for maintaining a secure operational environment, safeguarding company assets and promot...
Subscriber Content
Mon, Jan 6, 2025
Policies & Procedures

Virus Protection Policy

Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Subscriber Content
Mon, Jan 6, 2025
Policies & Procedures

User Information Security Policy

Maintain the security and integrity of your organization’s information systems with this sample user information securit...
Subscriber Content
Mon, Dec 30, 2024