IT Audit

The following 321 items are listed by Content Data.
Audit Programs

System Backup Review Audit Work Program

The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Mon, Oct 26, 2015
Audit Programs

Commercial Property Lease Application Audit Work Program

This audit program reviews an application that handles transactions related to leasing and renting commercial property.
Subscriber Content
Mon, Sep 28, 2015
Audit Programs

Program Changes Audit Work Program

This audit program focuses on auditing program change controls.
Subscriber Content
Mon, Aug 17, 2015
Newsletters

Does Your Organization Face Change With Confidence?

In this issue of The Bulletin, we discuss how facing change with confidence is crucial in a rapidly shifting business en...
Subscriber Content
Mon, Jul 27, 2015
Process Flows

Data Conversion Process Flow

Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Mon, Jul 6, 2015
Audit Programs

Software Licensure Compliance Audit Work Program

This sample compliance work program can be modified for scope considerations that will depend on the extent of the softw...
Subscriber Content
Mon, Jun 22, 2015
Risk & Control Matrices - RCMs

Deploy and Maintain Solutions RCM

This document outlines risks and controls common to the "deploy and maintain solutions" process in a risk control matrix...
Subscriber Content
Mon, Jun 1, 2015
Audit Programs

IT Data Management Audit Work Program

This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Mon, May 25, 2015
Audit Programs

IT Help Desk Audit Work Program

This document outlines steps to audit an organization’s IT help desk process.
Subscriber Content
Mon, May 18, 2015
Audit Programs

IT Strategy Management Audit Work Program

This document outlines steps to audit an organization’s IT infrastructure management strategy process.
Subscriber Content
Mon, May 18, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Newsletters

Briefing the Board on IT Matters

In this issue of Board Perspectives: Risk Oversight, we outline three contexts for conducting IT briefings with the boar...
Subscriber Content
Mon, May 11, 2015