The following 183 items are listed by Content Data.
Audit Programs
System Intrusion Audit Work Program
Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Benchmarking Reports
2024 Finance Trends Survey Report
Protiviti’s latest Global Finance Trends Report reveals a tale of transformation for CFOs whose responsibilities continu...
Policies & Procedures
Data Security Policy
Download the best-practice procedures in this policy, including classification, encryption, access control and secure st...
Audit Programs
E-Commerce Website Audit Work Program
Strengthen your e-commerce website's internal audit with our comprehensive E-Commerce Website Audit Work Program.
Blog
New Content on KnowledgeLeader - 10/7/2024
ToolsThe following tools were published on KnowledgeLeader this week:IT Audit Update: Audit Committee ...
Blog
ESG: The Latest Practices and Tools
What Does ESG Stand For?In nearly every industry, environmental, social and governance (ESG) practices have...
Checklists & Questionnaires
Data Center General Controls Questionnaire
Use this questionnaire to meticulously evaluate your mainframe data center's operational controls and enhance security, ...
Subscriber Content
Articles
NSW Health Pathology CEO: Patient Empowerment, AI and Big Data Are Trends to Watch in Healthcare
AI, big data and digital advances in testing and treatment will protect and empower patients, according to the CEO of Au...
Subscriber Content
Audit Programs
Customer Credit Data Analytics Audit Work Program
This seven-page work program utilizes data analytics to review the customer credit process.
Subscriber Content
Articles
Digital Expert: Metadata and ID Keys to Unlocking E-Government
ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Subscriber Content
Policies & Procedures
Personnel Records Policy
Download our personnel records policy for effective document retention and employee privacy management guidelines.
Subscriber Content
Articles
Building Your Toolkit for Quantifying Cyber Risk
A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Subscriber Content