The following 303 items are listed by Content Data.
Blog
Guide to the State of Data Analytics
What is Data Analytics?
Data analytics is the practice of embedding insight into operations to drive busin...
Blog
How to Remarkably Audit Your IT Initiatives
Changes to a company’s information technology (IT) environment, both information systems and the underlying...
Blog
The Three Components of a Successful Systems Design
What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Blog
What is IT Audit?
It is common to find organizations investing more and more resources – money, time, staff, etc. – these day...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...
Blog
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Blog
Change Management Audits: Key Factors You Need to Know
Information technology is critical to the long-term success of most organizations. It is a key driver for ...
Blog
What is Transaction Authenticity?
What is Transaction Authenticity?
"Transaction authenticity" can be defined as the authentication of a par...
Blog
What is Internal Auditing?
What is Internal Auditing?
About Internal Audit
The internal audit profession, through The Institute of ...
Blog
What Are the Benefits and Risks Associated With Data Integrity?
Data integrity is the assurance that information can only be accessed or modified by those authorized to a...
Blog
How to Identify Gaps in Your IT Strategy Process
Everybody is talking about IT strategy these days. As IT managers, you’re faced with considerable pressure...
Audit Programs
Physical Security for Information Technology Facilities Audit Work Program
The purpose of this work program is to provide the general steps used to perform an audit of physical security for IT fa...
Subscriber Content