The following 210 items are listed by Content Data.
Audit Programs
System Backup Review Audit Work Program
The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Audit Programs
Software Licensure Compliance Audit Work Program
This sample compliance work program can be modified for scope considerations that will depend on the extent of the softw...
Subscriber Content
Audit Programs
Security Policy Review Audit Work Program
The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Audit Programs
IT Data Management Audit Work Program
This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Audit Programs
Desktop Management Audit Work Program
This document outlines steps to audit the process used to deploy software to desktop computers.
Subscriber Content
Newsletters
Managing Cyber Threats with Confidence
This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Audit Programs
IT Application Management Audit Work Program
This sample IT application management audit work program is designed around key risk indicators of potential problems.
Subscriber Content
Newsletters
Managing Cybersecurity Risk
In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Policies & Procedures
System, Database and Application Administrator Policy
The purpose of this policy is to define the roles, activities, and responsibilities of administrators with regard to acc...
Subscriber Content
Policies & Procedures
User Authentication and Authorization Policy
The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Policies & Procedures
Systems Development Lifecycle (SDLC) and Change Management Policy
This sample outlines a set of policies and procedures designed to provide an orderly process in which changes to a compa...
Subscriber Content