The following 249 items are listed by Content Data.
Audit Programs
Firewall Audit Work Program
This tool contains four sample work programs that provide general steps organizations can use for conducting a firewall ...
Subscriber Content
Performer Profiles
Ahold Delhaize: Remodelling Internal Audit While the Store Is Open
Ahold Delhaize Chief Audit Executive Dimitrich Stopetie shares how he has revamped his internal audit team to become a s...
Subscriber Content
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Checklists & Questionnaires
System Implementation Process Questionnaire
The questions included in this tool can be applied to the implementation of new systems or major upgrades.
Subscriber Content
Methodologies & Models
Six Elements of Infrastructure for Public Company Readiness
This document includes the six elements of infrastructure focused on an organization’s public company readiness process.
Subscriber Content
Audit Programs
Intellectual Property Network Audit Work Program
In this work program sample, we outline general best-practice steps for the intellectual property network audit process.
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Methodologies & Models
Intellectual Property Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s intellectual property management...
Subscriber Content
Policies & Procedures
Password Security Policy
This tool contains four sample policies that establish a company’s guidelines regarding secure and consistent system pas...
Subscriber Content
Policies & Procedures
Virus Protection Policy
This tool contains four sample policies that define best-practice guidelines and procedures for protecting company compu...
Subscriber Content
Checklists & Questionnaires
IT Change Management Process Questionnaire
Use the questions included in this tool to ensure that all changes to IT resources and infrastructure configurations are...
Subscriber Content