The following 208 items are listed by Content Data.
Checklists & Questionnaires
Information Technology (IT) General Controls Questionnaire
This tool provides questions to consider when assessing a company’s information technology (IT) controls.
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Communications
This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Audit Reports
Data Privacy Maturity Audit Report
This report provides findings from the data privacy maturity assessment at any given company.
Subscriber Content
Checklists & Questionnaires
Bank Controls: Information Systems Evaluation Tool
This tool helps to assist management in analyzing the effectiveness of the internal control structure over financial rep...
Subscriber Content
Audit Programs
EDI Audit Work Program
This sample work program focuses on the processes to set up, design, and test client and carrier interfaces, and underst...
Subscriber Content
Articles
Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics
Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Newsletters
Oversight of Organizational Speed in the Digital Age
This issue explores 10 ideas on managing to the speed of business and its implications to board oversight.
Subscriber Content