The following 123 items are listed by Content Data.
Audit Reports
IT Risks and Controls Review Report
The objective of this audit report is to reduce the volume of controls across applications, infrastructure and IT proces...
Subscriber Content
Audit Reports
Business Continuity Software Research Report
This report assesses various business continuity software solution providers in the global market with the purpose of en...
Subscriber Content
Protiviti Booklets
Guide to Public Company Transformation
This guidance, now in its fourth edition, is designed to serve as a convenient and user-friendly resource that executive...
Subscriber Content
Newsletters
How Long Does It Take to Implement a Patch?
A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Subscriber Content
Audit Reports
IT Risk Assessment Audit Report
This risk assessment audit report outlines findings from a high-level IT risk assessment at a company.
Subscriber Content
Checklists & Questionnaires
Risk Assessment Questionnaire
Organizations can use the risk assessment questionnaire included in this tool to prepare for annual budgeting and busine...
Subscriber Content
Checklists & Questionnaires
IT Risk Assessment Questionnaire
This tool includes risk assessment questions for both IT management and executive IT management.
Subscriber Content
Policies & Procedures
IT Network Access Policy
This sample policy outlines guidelines for granting, modifying and disabling network user access to a company’s network ...
Subscriber Content
Audit Reports
Cybersecurity Audit Report
This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Methodologies & Models
Protiviti Risk Model
The Protiviti Risk Model is a comprehensive organizing framework for defining and understanding potential business risks...
Subscriber Content
Policies & Procedures
Internet and Email Acceptable Use Policy
This sample policy helps company employees optimize their use of the internet, protect confidential information, preserv...
Subscriber Content