IT Risk

The following 123 items are listed by Content Data.
Audit Reports

IT Risks and Controls Review Report

The objective of this audit report is to reduce the volume of controls across applications, infrastructure and IT proces...
Subscriber Content
Mon, Nov 5, 2018
Audit Reports

Business Continuity Software Research Report

This report assesses various business continuity software solution providers in the global market with the purpose of en...
Subscriber Content
Mon, Oct 1, 2018
Protiviti Booklets

Guide to Public Company Transformation

This guidance, now in its fourth edition, is designed to serve as a convenient and user-friendly resource that executive...
Subscriber Content
Mon, Sep 24, 2018
Newsletters

How Long Does It Take to Implement a Patch?

A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content
Mon, Dec 4, 2017
Policies & Procedures

Information Technology Policy: Role-Based User Management

This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

IT Risk Assessment Audit Report

This risk assessment audit report outlines findings from a high-level IT risk assessment at a company.
Subscriber Content
Mon, Oct 23, 2017
Checklists & Questionnaires

Risk Assessment Questionnaire

Organizations can use the risk assessment questionnaire included in this tool to prepare for annual budgeting and busine...
Subscriber Content
Mon, Sep 18, 2017
Checklists & Questionnaires

IT Risk Assessment Questionnaire

This tool includes risk assessment questions for both IT management and executive IT management.
Subscriber Content
Mon, Sep 4, 2017
Policies & Procedures

IT Network Access Policy

This sample policy outlines guidelines for granting, modifying and disabling network user access to a company’s network ...
Subscriber Content
Mon, Aug 14, 2017
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Methodologies & Models

Protiviti Risk Model

The Protiviti Risk Model is a comprehensive organizing framework for defining and understanding potential business risks...
Subscriber Content
Mon, Jul 31, 2017
Policies & Procedures

Internet and Email Acceptable Use Policy

This sample policy helps company employees optimize their use of the internet, protect confidential information, preserv...
Subscriber Content
Mon, Jul 24, 2017