The following 34 items are listed by Content Data.
Articles
Who Is Watching the Bots? Part Two: Operational Challenges and Solutions
Part two of our RPA discussion addresses several operational challenges related to security, change management and busin...
Subscriber Content
Articles
Who Is Watching the Bots? Part One: RPA Governance
This article explains how robotic process automation (RPA) at scale requires good governance to enable success while hel...
Subscriber Content
Audit Reports
IT Strategy Gap Assessment Report
Strategic alignment between business goals and drivers and IT's goals and initiatives is a critical area for most organi...
Subscriber Content
Memos
IT Governance Diagnostic Memo
This sample memo serves as a report of an internal audit function’s high-level assessment of the company’s IT governance...
Subscriber Content
Articles
Legacy Core Systems Outlook: Advancing Technologies Are Hastening the Necessity to Modernize
This article summarizes key points from Protiviti’s recent white paper on the disruptive influence that the cloud and AP...
Subscriber Content
Audit Reports
IT Governance Review Report
Objectives of this sample IT governance report include gaining a high-level understanding of the organization's IT gover...
Subscriber Content
Newsletters
Oversight of Organizational Speed in the Digital Age
This issue explores 10 ideas on managing to the speed of business and its implications to board oversight.
Subscriber Content
Checklists & Questionnaires
Information Technology (IT) Infrastructure Questionnaire
This tool helps auditors gather information related to information technology infrastructure, which helps with understan...
Subscriber Content
Checklists & Questionnaires
IT Due Diligence Questionnaire
This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Newsletters
Board Oversight of Cyber Risk
Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Policies & Procedures
Portable Computing Device Security Policy
This sample policy establishes safeguards for the use of portable media and computing devices, including their connectio...
Subscriber Content
Risk & Control Matrices - RCMs
Manage IT Assets RCM
This document outlines risks and controls common to the "manage IT assets" process in an RCM format.
Subscriber Content