The following 232 items are listed by Content Data.
Articles
Hong Kong CEO: Business With a Purpose — and Partnerships — Is the Future of ESG
The Mekong Club’s CEO believes that when it comes to business with a purpose, a company needs to do more than commit to ...
Policies & Procedures
IT Personnel Security Policy
This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Policies & Procedures
Building and Data Center Physical Security Policy
This policy sample can be used by organizations to ensure that company buildings and data centers remain secure.
Guides
Business Intelligence Overview and Guide
This guide provides auditors with a comprehensive breakdown of the meaning, importance and drivers of business intellige...
Performer Profiles
ConocoPhillips: Evolving Internal Audit Toward a Technology-Enabled Future
Bob Heinrich, general auditor at ConocoPhillips, highlights his team’s critical efforts toward developing an organizatio...
Guides
Data Migration Strategy Guide
This guide is designed to help auditors successfully execute a data migration from end to end.
Audit Reports
Internal Audit Strategic Vision Report
Auditors can use this audit report template to form an internal audit strategic plan and develop a road map to achieve t...
Risk & Control Matrices - RCMs
Manage Data Center Operations: Database Management RCM
This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Newsletters
The Board’s Role in the Transformation of Work
In this issue of Board Perspectives, we explore how boards and directors can facilitate a hybrid work model.
Policies & Procedures
Confidentiality Policy
This tool includes three sample policies that define guidelines concerning confidential company information.
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.