IT Security

The following 182 items are listed by Content Data.

Memos

Security Access Badges Memo

This sample memo serves as a report of an internal audit function’s high-level assessment of the security access badges ...
Subscriber Content
Mon, May 30, 2022
Methodologies & Models

Application Performance Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s application performance manageme...
Subscriber Content
Mon, May 23, 2022
Policies & Procedures

IT Contingency Planning Policy

The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Mon, May 16, 2022
Policies & Procedures

Internet Usage Policy

This tool includes four sample policies that define a company’s guidelines and procedures related to employee use of the...
Subscriber Content
Mon, Mar 21, 2022
Benchmarking Reports

2021 Finance Trends Survey Report: Consumer Products and Retail Industry Group

This report contains several key priorities for retail and CPG finance leaders to consider, based on the results from Pr...
Subscriber Content
Mon, Dec 20, 2021
Policies & Procedures

IT Equipment and Information Control Policy

This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Mon, Dec 20, 2021
Risk & Control Matrices - RCMs

Manage Data Center Operations: Reference and Master Data Management RCM

This document outlines risks and controls common to reference and master data management in a risk control matrix (RCM) ...
Subscriber Content
Mon, Dec 20, 2021
Newsletters

Ransomware: Analyzing Risk and Protecting Critical Assets

In this issue of Board Perspectives, we provide four ways boards can respond strategically to ransomware exposures.
Subscriber Content
Mon, Dec 13, 2021
Policies & Procedures

Systems Audit Logging and Monitoring Policy

This sample policy is designed to help organizations define and comply with system audit logging and monitoring requirem...
Subscriber Content
Mon, Dec 13, 2021
Benchmarking Tools

Transaction Authority Risk Key Performance Indicators (KPIs)

This tool contains performance measures and questions an organization can use to enforce and ensure the validity of tran...
Subscriber Content
Mon, Dec 13, 2021
Audit Programs

Application Security Review and Testing Audit Work Program

This tool includes two sample audit programs that provide steps organizations can take to facilitate an application secu...
Subscriber Content
Mon, Nov 8, 2021
Policies & Procedures

Separation of Duties Policy

In this sample policy, we outline the standards for applying separation of duties to protect a company’s information ass...
Subscriber Content
Mon, Nov 1, 2021