The following 210 items are listed by Content Data.
Newsletters
The Top Risks for the Next Decade: A Global Perspective (2021)
This issue of Board Perspectives summarizes seven key takeaways from Protiviti’s Executive Perspectives on Top Risks in ...
Subscriber Content
Articles
To Meet Today’s Challenges, CAEs Must Stay Focused on Next-Gen Internal Audit Practices
This article explains how audit leaders can initiate and maintain next-generation capabilities in today's dynamic enviro...
Subscriber Content
Audit Programs
Data Privacy Audit Work Program
This work program sample highlights general steps an organization should follow with respect to effective data privacy.
Subscriber Content
Performer Profiles
Microsoft Corporation: Leading With What’s Next in Agile Auditing
In this profile, Michael Williams, group IT audit program manager at Microsoft, explains how his team has leveraged agil...
Subscriber Content
Articles
Internal Audit Leaders Need to Step Up Next-Gen Innovation and Transformation Initiatives, Protiviti Survey Finds
This article highlights the results of Protiviti’s 2020 Internal Audit Capabilities and Needs Survey and outlines how au...
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Articles
Architecting Your Cloud Infrastructure for Failure (and Resilience)
This article notes five keys to architecting for failure that firms should consider to meet the evolving threat and regu...
Subscriber Content
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Memos
Security Access Badges Memo
The purpose of this sample memo is to outline the utilization of security access badges by a company to restrict access ...
Subscriber Content
Policies & Procedures
Data Classification Standard Policy
This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content
Policies & Procedures
Data Access and User Authentication Policy
The purpose of this access management policy is to ensure that access to all company systems and applications is properl...
Subscriber Content
Audit Programs
Systems and Data Audit Work Program
This sample work program can be used by auditors to identify and mitigate risks associated with an organization’s critic...
Subscriber Content