The following 210 items are listed by Content Data.
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Application Development and Change Control
This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content
Checklists & Questionnaires
Information Technology (IT) General Controls Questionnaire
This tool provides questions to consider when assessing a company’s information technology (IT) controls.
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Communications
This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Audit Reports
Data Privacy Maturity Audit Report
This report provides findings from the data privacy maturity assessment at any given company.
Subscriber Content
Checklists & Questionnaires
Bank Controls: Information Systems Evaluation Tool
This tool helps to assist management in analyzing the effectiveness of the internal control structure over financial rep...
Subscriber Content
Audit Programs
EDI Audit Work Program
This sample work program focuses on the processes to set up, design, and test client and carrier interfaces, and underst...
Subscriber Content