The following 191 items are listed by Content Data.
Policies & Procedures
Data Center Security Policy
This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Benchmarking Reports
2022 IT Audit Benchmarking Survey
The results of the latest IT Audit Technology Risks Survey from ISACA and Protiviti show a dynamic threat landscape that...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Audit Programs
Intellectual Property Network Audit Work Program
In this work program sample, we outline general best-practice steps for the intellectual property network audit process.
Subscriber Content
Policies & Procedures
Security Incident Policy
This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content
Newsletters
Framing the Data Privacy Discussion in the Boardroom
This issue of Board Perspectives provides eight topics relevant to the boardroom conversation around data privacy.
Subscriber Content
Policies & Procedures
Security Awareness Policy
This sample policy is designed to help organizations notify information system users about security policies, guidelines...
Subscriber Content
Audit Programs
Enterprise Risk Planning (ERP) Integration Architecture Audit Work Program
This work program template provides steps organizations can take to perform an enterprise risk planning (ERP) integratio...
Subscriber Content
Policies & Procedures
Physical and Environmental Security Policy
This sample policy is designed to help organizations prevent unauthorized access, damage and interference to business pr...
Subscriber Content
Methodologies & Models
Intellectual Property Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s intellectual property management...
Subscriber Content
Policies & Procedures
Password Security Policy
This tool contains four sample policies that establish a company’s guidelines regarding secure and consistent system pas...
Subscriber Content