IT Strategy

The following 71 items are listed by Content Data.
Articles

Back Off, Inefficiencies: Conquering Chaos in the Back Office Is Closer Than You Think

This article explains how a hard-working team of internal resources and external partners can apply their respective exp...
Subscriber Content
Mon, May 13, 2019
Risk & Control Matrices - RCMs

Manage Service Contracts: Entering Contracts into the System RCM

This document outlines risks and controls common to the ‘‘support end users” process in a risk control matrix (RCM) form...
Subscriber Content
Mon, Feb 11, 2019
Articles

Regulation at the Speed of Innovation: Developing an Adaptive Risk Strategy for Agile and DevOps Environments

DevOps—a concatenation of development and operations—is a fast and flexible approach to developing and delivering softwa...
Subscriber Content
Mon, Oct 29, 2018
Policies & Procedures

Do Not Call Registry Policy

This sample policy ensures that all rules and regulations related to telemarketing are complied with and nothing is done...
Subscriber Content
Mon, Nov 6, 2017
Guides

Service-Level Agreement Guide

This sample document can be used by organizations as a guide to developing and understanding service-level agreements (S...
Subscriber Content
Mon, Sep 18, 2017
Policies & Procedures

Software Acquisition, Implementation and Maintenance: Application Development and Implementation Policy

The purpose of this sample policy is to control application development and to ensure that application development is ef...
Subscriber Content
Mon, Sep 18, 2017
Policies & Procedures

Sustainability Policy

This sample policy helps to ensure that principles of sustainability are incorporated into actions carried out by the co...
Subscriber Content
Mon, Sep 4, 2017
Checklists & Questionnaires

IT Due Diligence Questionnaire

This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Mon, Jun 19, 2017
Policies & Procedures

Portable Computing Device Security Policy

This sample policy establishes safeguards for the use of portable media and computing devices, including their connectio...
Subscriber Content
Mon, Apr 3, 2017
Policies & Procedures

Help Desk Infrastructure Policy

This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Mon, Dec 5, 2016
Risk & Control Matrices - RCMs

Manage Systems Development Lifecycle (SDLC) RCM

This document outlines risks and controls common to the “manage systems development lifecycle (SDLC)” process in a risk ...
Subscriber Content
Mon, Nov 28, 2016
Audit Programs

Virtual Private Network (VPN) Administration Audit Work Program

This audit work program includes test steps in the areas of documentation, logging, monitoring and user pool for VPN adm...
Subscriber Content
Mon, Nov 7, 2016