Data Security

The following 183 items are listed by Content Data.
Audit Programs

System Intrusion Audit Work Program

Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Mon, Oct 28, 2024
Benchmarking Reports

2024 Finance Trends Survey Report

Protiviti’s latest Global Finance Trends Report reveals a tale of transformation for CFOs whose responsibilities continu...
Mon, Oct 7, 2024
Policies & Procedures

Data Security Policy

Download the best-practice procedures in this policy, including classification, encryption, access control and secure st...
Mon, Oct 7, 2024
Audit Programs

E-Commerce Website Audit Work Program

Strengthen your e-commerce website's internal audit with our comprehensive E-Commerce Website Audit Work Program.
Mon, Oct 7, 2024
Blog

New Content on KnowledgeLeader - 10/7/2024

ToolsThe following tools were published on KnowledgeLeader this week:IT Audit Update: Audit Committee ...
Mon, Oct 7, 2024
Blog

ESG: The Latest Practices and Tools

What Does ESG Stand For?In nearly every industry, environmental, social and governance (ESG) practices have...
Mon, Sep 30, 2024
Checklists & Questionnaires

Data Center General Controls Questionnaire

Use this questionnaire to meticulously evaluate your mainframe data center's operational controls and enhance security, ...
Subscriber Content
Mon, Sep 16, 2024
Articles

NSW Health Pathology CEO: Patient Empowerment, AI and Big Data Are Trends to Watch in Healthcare

AI, big data and digital advances in testing and treatment will protect and empower patients, according to the CEO of Au...
Subscriber Content
Mon, Sep 9, 2024
Audit Programs

Customer Credit Data Analytics Audit Work Program

This seven-page work program utilizes data analytics to review the customer credit process.
Subscriber Content
Mon, Sep 2, 2024
Articles

Digital Expert: Metadata and ID Keys to Unlocking E-Government

ServiceGen Digital Expert Ian Oppermann explains the importance of having a true digital identity to access e-government...
Subscriber Content
Mon, Jun 24, 2024
Policies & Procedures

Personnel Records Policy

Download our personnel records policy for effective document retention and employee privacy management guidelines.
Subscriber Content
Mon, Jun 24, 2024
Articles

Building Your Toolkit for Quantifying Cyber Risk

A look at the cyber risk quantification (CRQ) process and its benefits in prioritizing risks, allocating resources effec...
Subscriber Content
Mon, Jun 10, 2024