IT Security

The following 182 items are listed by Content Data.

Newsletters

Ransomware: Analyzing Risk and Protecting Critical Assets

In this issue of Board Perspectives, we provide four ways boards can respond strategically to ransomware exposures.
Subscriber Content
Mon, Dec 13, 2021
Policies & Procedures

Systems Audit Logging and Monitoring Policy

This sample policy is designed to help organizations define and comply with system audit logging and monitoring requirem...
Subscriber Content
Mon, Dec 13, 2021
Benchmarking Tools

Transaction Authority Risk Key Performance Indicators (KPIs)

This tool contains performance measures and questions an organization can use to enforce and ensure the validity of tran...
Subscriber Content
Mon, Dec 13, 2021
Audit Programs

Application Security Review and Testing Audit Work Program

This tool includes two sample audit programs that provide steps organizations can take to facilitate an application secu...
Subscriber Content
Mon, Nov 8, 2021
Policies & Procedures

Separation of Duties Policy

In this sample policy, we outline the standards for applying separation of duties to protect a company’s information ass...
Subscriber Content
Mon, Nov 1, 2021
Newsletters

Ransomware: Preventing an Attack and Responding to and Recovering From an Attack

This issue of The Bulletin focuses on the six components of cyber resilience and provides countermeasures businesses can...
Subscriber Content
Mon, Oct 18, 2021
Risk & Control Matrices - RCMs

Manage Security and Privacy: Manage Security Configurations RCM

This document outlines risks and controls common to managing security configurations during the security and privacy man...
Subscriber Content
Mon, Sep 27, 2021
Benchmarking Tools

Enterprise Security Key Performance Indicators (KPIs)

The purpose of this tool is to encourage dialog and help an organization assess the state of its network security. Areas...
Subscriber Content
Mon, Sep 6, 2021
Audit Programs

Enterprise Resource Planning Security Audit Work Program

In this work program sample, we list general best-practice steps for the enterprise resource planning security process.
Subscriber Content
Mon, Aug 9, 2021
Articles

Preparing for a Dynamic Post-Pandemic Fraud Landscape

The five strategies described in this article can help organizations strengthen their fraud prevention practices and avo...
Subscriber Content
Mon, Aug 2, 2021
Benchmarking Tools

Privacy Program Leading Practices

This tool features several leading practices to consider when establishing a privacy program.
Subscriber Content
Mon, Jul 26, 2021
Articles

The Three C’s of a Quality Cloud Audit

This article outlines Protiviti's comprehensive cloud audit approach, which is based on leading practices and frameworks...
Subscriber Content
Mon, Jul 5, 2021