IT Risk

The following 123 items are listed by Content Data.
Audit Programs

IT Data Management Audit Work Program

This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Mon, May 25, 2015
Newsletters

Managing Cyber Threats with Confidence

This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Mon, Apr 13, 2015
Audit Programs

IT Application Management Audit Work Program

This sample IT application management audit work program is designed around key risk indicators of potential problems.
Subscriber Content
Mon, Apr 6, 2015
Protiviti Booklets

Internal Auditing Around the World: Volume 10

In this booklet, we share accounts from some of the world’s leading organizations’ internal audit executives that show t...
Subscriber Content
Tue, Jul 8, 2014
Guides

IT Asset Management Guide

This guide focuses on improvements organizations can make to effectively perform their IT asset management process.
Subscriber Content
Mon, Jun 23, 2014
Newsletters

Oversight of IT Risk Management

In this issue of Board Perspectives: Risk Oversight, we make suggestions for boards to consider as they enhance their ri...
Subscriber Content
Mon, Mar 10, 2014
Audit Programs

System Management Risk Assessment and Control Audit Work Program

This work program will assist audit teams with identifying risks and related controls for logical security administratio...
Subscriber Content
Mon, Mar 3, 2014
Newsletters

Managing Cybersecurity Risk

In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Mon, Jun 10, 2013
Newsletters

Social Business: What it Means to Your Risk Profile

This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content
Mon, May 6, 2013
Policies & Procedures

User Authentication and Authorization Policy

The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Mon, Oct 29, 2012
Policies & Procedures

User Malicious Software Policy

The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Mon, May 28, 2012
Policies & Procedures

Blog and Social Networking Policy

The purpose of this policy is to ensure that all employee blog and social networking activities incorporate consistent s...
Subscriber Content
Mon, Apr 9, 2012