IT Security

The following 211 items are listed by Content Data.
Guides

Achieving a Robust Data Analytics Program Guide

This tool can be used as a guide for measuring and improving an organization’s data analytics program.
Subscriber Content
Mon, Nov 21, 2022
Process Flows

Time Reporting Process Flow

This sample process flow can be used as a general guide to understanding and reviewing the steps in an organization’s ti...
Subscriber Content
Mon, Oct 24, 2022
Policies & Procedures

Third-Party Access Policy

This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Subscriber Content
Mon, Oct 3, 2022
Policies & Procedures

Infrastructure Security Policy

Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Mon, Sep 26, 2022
Policies & Procedures

Data Center Security Policy

This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Mon, Aug 29, 2022
Methodologies & Models

Security Governance Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content
Mon, Aug 29, 2022
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 15, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022
Articles

How Quantum Computing Will Impact the Future of Cities

Protiviti’s Joe Kornik and Konstantinos Karagiannis sat down to discuss the impact quantum computing could have on the f...
Subscriber Content
Mon, Aug 1, 2022
Methodologies & Models

Security Risk Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security risk management process...
Subscriber Content
Mon, Jul 11, 2022
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Mon, Jul 4, 2022
Policies & Procedures

Security Incident Policy

This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content
Mon, Jun 27, 2022