Data Security

The following 204 items are listed by Content Data.
Policies & Procedures

Data Center Security Policy

This sample policy establishes operational standards for the physical security of a company’s data center.
Mon, Aug 29, 2022
Benchmarking Reports

2022 IT Audit Benchmarking Survey

The results of the latest IT Audit Technology Risks Survey from ISACA and Protiviti show a dynamic threat landscape that...
Mon, Aug 15, 2022
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 15, 2022
Audit Programs

Intellectual Property Network Audit Work Program

In this work program sample, we outline general best-practice steps for the intellectual property network audit process.
Mon, Aug 8, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Mon, Aug 8, 2022
Newsletters

Framing the Data Privacy Discussion in the Boardroom

This issue of Board Perspectives provides eight topics relevant to the boardroom conversation around data privacy.
Subscriber Content
Mon, Jun 27, 2022
Policies & Procedures

Security Incident Policy

This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content
Mon, Jun 27, 2022
Policies & Procedures

Security Awareness Policy

This sample policy is designed to help organizations notify information system users about security policies, guidelines...
Subscriber Content
Mon, Jun 20, 2022
Audit Programs

Enterprise Risk Planning (ERP) Integration Architecture Audit Work Program

This work program template provides steps organizations can take to perform an enterprise risk planning (ERP) integratio...
Subscriber Content
Mon, Jun 6, 2022
Policies & Procedures

Physical and Environmental Security Policy

This sample policy is designed to help organizations prevent unauthorized access, damage and interference to business pr...
Subscriber Content
Mon, Jun 6, 2022
Methodologies & Models

Intellectual Property Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s intellectual property management...
Subscriber Content
Mon, May 30, 2022
Policies & Procedures

Password Security Policy

This tool contains four sample policies that establish a company’s guidelines regarding secure and consistent system pas...
Subscriber Content
Mon, May 23, 2022