The following 208 items are listed by Content Data.
Policies & Procedures
Network Security Policy
Our Network Security Policy is designed to help companies protect their user accounts, corporate data and intellectual p...
Policies & Procedures
Access Management Policy
Ensure that access to all your organization’s systems and applications is properly approved and monitored with our Acces...
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Audit Reports
Expenditure Process Review Report
Our Expenditure Process Review Report includes a future-state design to consider when reviewing your organization’s expe...
Audit Programs
System Post-Implementation Audit Work Program
Organizations can use the three audit program samples in this tool to assess the usage, supporting information technolog...
Policies & Procedures
Intranet and Internet Security Policy
This tool contains two sample policies that outline guidelines for a company's internet and intranet security.
Policies & Procedures
IT Data Management Policy
Our IT Data Management Policy outlines guidelines to ensure that critical data stored in applications and on servers is ...
Methodologies & Models
IT Operations Capability Maturity Model (CMM)
Discover how this capability maturity model can enhance your organization’s IT operations management process.
Subscriber Content
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT asset management process and ...
Subscriber Content
Policies & Procedures
Portable Computing Device Security Policy
This sample policy establishes safeguards for the use of portable media and computing devices, including their connectio...
Articles
Human Performance Measures for Cybersecurity Operations Centers
This article offers an overview of a variety of different dimensions for measuring an analyst’s performance.
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.