The following 211 items are listed by Content Data.
Policies & Procedures
Encryption Key Policy
This tool contains two sample policies that establish guidelines for use of encryption to secure company information ass...
Subscriber Content
Articles
Importance of Internal Controls for Cybersecurity
Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Newsletters
The Top Risks for the Next Decade: A Global Perspective (2021)
This issue of Board Perspectives summarizes seven key takeaways from Protiviti’s Executive Perspectives on Top Risks in ...
Subscriber Content
Audit Programs
Data Privacy Audit Work Program
This work program sample highlights general steps an organization should follow with respect to effective data privacy.
Subscriber Content
Policies & Procedures
Enterprise Assessment and Monitoring Policy
The purpose of this policy is to develop a consistent method for scheduling and managing company IT security assessment ...
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Articles
Tech Can Help Oil and Gas Firms Survive Market Turmoil
Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Memos
Security Access Badges Memo
The purpose of this sample memo is to outline the utilization of security access badges by a company to restrict access ...
Subscriber Content
Policies & Procedures
Data Classification Standard Policy
This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Policies & Procedures
Authorization to Use or Disclose PHI: HIPAA Policy
This sample policy outlines procedures organizations should follow common to proper use or disclosure of protected healt...
Subscriber Content