The following 198 items are listed by Content Data.
Blog
What is IT Audit?
It is common to find organizations investing more and more resources – money, time, staff, etc. – thes...
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Newsletters
The Cyber Risk Oversight Challenge
Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Protiviti Booklets
U.S. Anti-Money Laundering Requirements
This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Policies & Procedures
Workstation Use Policy
This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Policies & Procedures
Sensitive Data Handling Policy
The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Blog
Guide to the State of Data Analytics
What is Data Analytics?Data analytics is the practice of embedding insight into operations to drive busines...
Blog
Business Intelligence Competency Centers Overview and Guide
The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...