The following 182 items are listed by Content Data.
Blog
New Content on KnowledgeLeader - 4/7/2025
ToolsThe following tools were published on KnowledgeLeader this week:Quarterly Compliance Assessment A...
Audit Programs
Virtual Private Network (VPN) Administration Audit Work Program
Access our thorough VPN administration audit work program for assessing documentation, logging, monitoring and user pool...
Subscriber Content
Blog
New Content on KnowledgeLeader - 3/31/2025
ToolsThe following tools were published on KnowledgeLeader this week:Employee Stock Option Termination...
Audit Programs
IT Organization Audit Work Program
Evaluate the effectiveness and efficiency of your IT operations, ensuring alignment with business objectives while ident...
Subscriber Content
Blog
New Content on KnowledgeLeader - 3/24/2025
ToolsThe following tools were published on KnowledgeLeader this week:Intercompany Accounting PolicyThi...
Audit Reports
Data Privacy Maturity Audit Report
Assess and improve your organization's data privacy practices, ensure regulatory compliance, and mitigate risks related ...
Subscriber Content
Audit Programs
System Backup Review Audit Work Program
Ensure that your organization's backup procedures are robust, compliant and aligned with best practices and safeguard cr...
Subscriber Content
Policies & Procedures
IT Change Management Policy
Ensure that modifications to IT assets are consistently recorded, assessed, authorized, tested and implemented in a syst...
Subscriber Content
Articles
Privacy, Data Protection and Cybersecurity in the Boardroom With Dr. Gregg Li
Dr. Gregg Li, governance architect, discusses technology, governance and the transformation of boards.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy - Administer Security: IT Physical Security RCM
Manage and mitigate security and privacy risks in alignment with your organization's evolving operational needs.
Subscriber Content
Checklists & Questionnaires
System Privileges for Terminated Employees Checklist
Take immediate action steps to protect your organization’s critical systems and data and secure systems in the event of ...
Subscriber Content
Policies & Procedures
Social Media Policy
Ensure that all team members are aligned with your company's values and legal requirements when they represent or refer ...
Subscriber Content