The following 349 items are listed by Content Data.
Policies & Procedures
Data Center Security Policy
This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Methodologies & Models
Security Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content
Benchmarking Reports
2022 IT Audit Benchmarking Survey
The results of the latest IT Audit Technology Risks Survey from ISACA and Protiviti show a dynamic threat landscape that...
Subscriber Content
Audit Programs
Intellectual Property Network Audit Work Program
In this work program sample, we outline general best-practice steps for the intellectual property network audit process.
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Requests for Proposals - RFPs
Request for Proposal: IT Audit
This sample request for proposal (RFP) can be used by organizations seeking a qualified service provider to implement an...
Subscriber Content
Policies & Procedures
Security Incident Policy
This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content
Audit Programs
Network Monitoring and Issue Management Audit Work Program
This work program sample provides best-practice general steps and control procedures for a network monitoring and issue ...
Subscriber Content
Methodologies & Models
Application Performance Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s application performance manageme...
Subscriber Content
Policies & Procedures
IT Contingency Planning Policy
The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Policies & Procedures
Virus Protection Policy
This tool contains four sample policies that define best-practice guidelines and procedures for protecting company compu...
Subscriber Content