IT Security

The following 210 items are listed by Content Data.
Newsletters

Sharpening the Focus on Cybersecurity

This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Mon, Apr 1, 2019
Audit Reports

Security Policy and Procedure Evaluation Report: Application Development and Change Control

This audit report records the result of an evaluation of application development and change control security policies an...
Subscriber Content
Mon, Dec 31, 2018
Checklists & Questionnaires

Information Technology (IT) General Controls Questionnaire

This tool provides questions to consider when assessing a company’s information technology (IT) controls.
Subscriber Content
Mon, Dec 3, 2018
Audit Reports

Security Policy and Procedure Evaluation Report: Data Security

This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Mon, Nov 26, 2018
Articles

Five Common Identity and Access Management Pitfalls

This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Mon, Oct 29, 2018
Articles

Integration Prioritization Model for Identity Access Management

Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Mon, Oct 29, 2018
Checklists & Questionnaires

Privacy and Data Protection Questionnaire

This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content
Mon, Oct 8, 2018
Audit Reports

Security Policy and Procedure Evaluation Report: Communications

This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Mon, Sep 24, 2018
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018
Audit Reports

Data Privacy Maturity Audit Report

This report provides findings from the data privacy maturity assessment at any given company.
Subscriber Content
Mon, Aug 6, 2018
Checklists & Questionnaires

Bank Controls: Information Systems Evaluation Tool

This tool helps to assist management in analyzing the effectiveness of the internal control structure over financial rep...
Subscriber Content
Mon, Jul 30, 2018
Audit Programs

EDI Audit Work Program

This sample work program focuses on the processes to set up, design, and test client and carrier interfaces, and underst...
Subscriber Content
Mon, Jul 30, 2018