The following 210 items are listed by Content Data.
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Guides
IT Security Awareness and Training Program Guide
We've designed this guide to help companies implement and strengthen security training and awareness.
Policies & Procedures
Infrastructure Policy: Laptops
This policy describes the security precautions that must be taken by all individuals who have a company-issued laptop or...
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Articles
The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead
This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content
Policies & Procedures
Security and Access Policy
This Security and Access Policy provides a company with a single reference for governance pertaining to matters of secur...
Subscriber Content
Policies & Procedures
Banking/Financial Institution Account Policy
The purpose of this policy is to ensure that the company’s cash, investments and other assets are adequately controlled ...
Subscriber Content
Policies & Procedures
Password Security Policy
Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Audit Programs
Business Continuity Management Audit Work Program
This BCM work program includes two samples that will help you assess the effectiveness of your BCM program and identify ...
Subscriber Content
Policies & Procedures
IT Acquisition and Divestiture Policy
This policy can be used to define requirements for the integration of or separation from a company.
Subscriber Content