The following 731 items are listed by Content Data.
Checklists & Questionnaires
General Threat Questionnaire
This sample checklist can be used for risk assessment to identify failure scenarios and the likelihood and severity of d...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Tax Functions: Internal Tax Function RCM
This document outlines risks and controls common to the “internal tax function” aspect of the process in a risk control ...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Audit Reports
Entity-Level Fraud Risk Assessment Process Report
This sample fraud risk assessment report provides an overview of the process one company undertook to satisfy the requir...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Fixed Assets: Disposals RCM
This document outlines risks and controls common to the “disposal risk” aspect of the fixed assets process in a risk con...
Subscriber Content
Checklists & Questionnaires
Working Capital Management Questionnaire
There are three fundamental building blocks of effective cash management: working capital optimization, cash flow foreca...
Subscriber Content
Protiviti Booklets
Guide to Public Company Transformation
This guidance, now in its fourth edition, is designed to serve as a convenient and user-friendly resource that executive...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Communications
This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Checklists & Questionnaires
Internal Security Questionnaire
This tool provides questions for audit committees to consider when assessing internal security risks.
Subscriber Content
Checklists & Questionnaires
Control Design Effectiveness Review Checklist
Document reviewers' comments and responses and address financial reporting assertions with our Control Design Effectiven...
Subscriber Content
Newsletters
Sustainability: The What, Why and How
In this issue of The Bulletin, Protiviti discusses sustainability — what it is, why it’s important, and the obstacles to...
Subscriber Content