The following 182 items are listed by Content Data.
Risk & Control Matrices - RCMs
Manage Security and Privacy - Administer Security: IT Physical Security RCM
Manage and mitigate security and privacy risks in alignment with your organization's evolving operational needs.
Subscriber Content
Checklists & Questionnaires
System Privileges for Terminated Employees Checklist
Take immediate action steps to protect your organization’s critical systems and data and secure systems in the event of ...
Subscriber Content
Policies & Procedures
Social Media Policy
Ensure that all team members are aligned with your company's values and legal requirements when they represent or refer ...
Subscriber Content
Checklists & Questionnaires
System Implementation Process Questionnaire
Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Subscriber Content
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Subscriber Content
Policies & Procedures
IT Personnel Security Policy
Define standards and procedures for maintaining a secure operational environment, safeguarding company assets and promot...
Subscriber Content
Policies & Procedures
User Information Security Policy
Maintain the security and integrity of your organization’s information systems with this sample user information securit...
Subscriber Content
Audit Reports
Identity Access Management Report
Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Subscriber Content
Articles
Confessions of an Ethical Hacker: “I Could Break Into Any Company, All It Takes Is Time”
What C-level executives and board members can do to protect their businesses from attacks and what cybersecurity looks l...
Subscriber Content
Audit Programs
EDI Audit Work Program
Explore our EDI Audit Work Program to master the setup, testing and oversight of secure data exchanges between clients a...
Subscriber Content
Policies & Procedures
System, Database and Application Administrator Policy
Define the roles, activities and responsibilities of administrators regarding access rights to applications running on c...
Subscriber Content
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Subscriber Content