IT Audit

The following 325 items are listed by Content Data.
Audit Programs

System Intrusion Audit Work Program

The objective of this audit work program is to evaluate a business’s ability to detect unauthorized system access attemp...
Subscriber Content
Mon, Mar 5, 2012
Newsletters

Social Media: What It Means to Your Risk Profile

In this issue of Board Perspectives: Risk Oversight, we reveal 10 examples of business risks to consider associated with...
Subscriber Content
Mon, Feb 6, 2012
Newsletters

Ten Questions the Board Should Ask

This issue of Board Perspectives: Risk Oversight provides 10 key questions for boards to consider as they plan their 201...
Subscriber Content
Mon, Dec 5, 2011
Policies & Procedures

Remote Network Access Policy

This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Mon, Sep 19, 2011
Process Flows

User Access Security Process Flow

This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Mon, Jun 20, 2011
Newsletters

Risk Management: A Look Back and a Look Forward

In this issue of The Bulletin, we look at how risk management has evolved over the past 25 years and some of the lessons...
Subscriber Content
Mon, Apr 11, 2011
Policies & Procedures

Security of Data Policy (with UNIX Example)

The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Mon, Mar 14, 2011
Policies & Procedures

Software Upgrade Policy

The following sample outlines a set of policies and procedures for software upgrades
Subscriber Content
Mon, Mar 7, 2011
Newsletters

Setting the 2011 Audit Committee Agenda

This issue of The Bulletin provides observations for consideration by boards of directors and their audit committees as ...
Subscriber Content
Mon, Jan 17, 2011
Protiviti Booklets

Internal Auditing Around the World: Volume 6

In this booklet, we profile nine international companies that value technology-based audit and data analysis techniques ...
Subscriber Content
Mon, Jun 28, 2010
Protiviti Booklets

The Global Privacy and Information Security Landscape: Frequently Asked Questions

This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Mon, May 3, 2010
Newsletters

Making Internal Audit a Value-Adding Contributor to Economic Recovery

This issue of The Bulletin explores how internal audit can contribute to an organization as it recovers from crisis goin...
Subscriber Content
Mon, Dec 14, 2009