The following 182 items are listed by Content Data.
Articles
The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead
This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content
Policies & Procedures
Security and Access Policy
This Security and Access Policy provides a company with a single reference for governance pertaining to matters of secur...
Subscriber Content
Policies & Procedures
Password Security Policy
Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Policies & Procedures
IT Acquisition and Divestiture Policy
This policy can be used to define requirements for the integration of or separation from a company.
Subscriber Content
Policies & Procedures
Disclosure of Private Data Policy
This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content
Audit Programs
Network Infrastructure Audit Work Program
This document contains three sample work programs that can be used by organizations for conducting an IT network infrast...
Subscriber Content
Articles
ISO 27001: 2022 – Key Changes and Approaches to Transition
A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Audit Programs
Firewall Audit Work Program
Strengthen your network defenses by following our step-by-step firewall audit program for effective security, compliance...
Subscriber Content
Policies & Procedures
Cellular Phone Policy
Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Guides
Data Migration Strategy Guide
This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Policies & Procedures
Background Checks and Confidentiality Policy: Contractors
This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Subscriber Content