IT Security

The following 182 items are listed by Content Data.

Articles

The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead

This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content
Mon, Oct 16, 2023
Policies & Procedures

Security and Access Policy

This Security and Access Policy provides a company with a single reference for governance pertaining to matters of secur...
Subscriber Content
Mon, Oct 2, 2023
Policies & Procedures

Password Security Policy

Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Mon, Sep 11, 2023
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 14, 2023
Policies & Procedures

IT Acquisition and Divestiture Policy

This policy can be used to define requirements for the integration of or separation from a company.
Subscriber Content
Mon, Jul 17, 2023
Policies & Procedures

Disclosure of Private Data Policy

This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content
Mon, Jun 12, 2023
Audit Programs

Network Infrastructure Audit Work Program

This document contains three sample work programs that can be used by organizations for conducting an IT network infrast...
Subscriber Content
Mon, May 29, 2023
Articles

ISO 27001: 2022 – Key Changes and Approaches to Transition

A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Mon, Apr 3, 2023
Audit Programs

Firewall Audit Work Program

Strengthen your network defenses by following our step-by-step firewall audit program for effective security, compliance...
Subscriber Content
Mon, Mar 20, 2023
Policies & Procedures

Cellular Phone Policy

Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Mon, Feb 20, 2023
Guides

Data Migration Strategy Guide

This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Mon, Jan 9, 2023
Policies & Procedures

Background Checks and Confidentiality Policy: Contractors

This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Subscriber Content
Mon, Dec 19, 2022