The following 210 items are listed by Content Data.
Audit Reports
Cybersecurity Audit Report
This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Policies & Procedures
Patient Admission Policy
This sample policy provides a consistent, standardized and proficient method for the admission of patients.
Subscriber Content
Benchmarking Tools
External Access Risk Key Performance Indicators (KPIs)
This tool outlines the business risks associated with inappropriate access to systems, data or information and suggests ...
Subscriber Content
Newsletters
Board Oversight of Cyber Risk
Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Policies & Procedures
User Information Security Policy
This sample policy provides guidelines for securing user information.
Subscriber Content
Policies & Procedures
Server Configuration Policy
This policy defines the standard security settings utilized on a company's servers.
Subscriber Content
Memos
Enterprise Accounting System Post-Implementation Review Memo
This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Memos
Network Audit Management Memo
This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Risk & Control Matrices - RCMs
Application Control Review RCM
This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Memos
Scope of Application Security Memo
This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Audit Programs
Siebel/Oracle Information Security Audit Work Program
This audit program outlines procedures to evaluate six system control objectives.
Subscriber Content
Risk & Control Matrices - RCMs
Define IT Strategy and Organization RCM
This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content