Data Security

The following 177 items are listed by Content Data.
Policies & Procedures

Network Access Control Devices Policy

The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content
Mon, Jul 5, 2021
Articles

The Three C’s of a Quality Cloud Audit

This article outlines Protiviti's comprehensive cloud audit approach, which is based on leading practices and frameworks...
Subscriber Content
Mon, Jul 5, 2021
Policies & Procedures

Encryption Key Policy

This tool contains two sample policies that establish guidelines for use of encryption to secure company information ass...
Subscriber Content
Mon, Jun 14, 2021
Articles

Importance of Internal Controls for Cybersecurity

Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Mon, Jun 14, 2021
Audit Programs

Intranet Audit Work Program

This work program sample highlights general steps an organization should follow when performing an intranet audit.
Subscriber Content
Mon, Jun 14, 2021
Newsletters

The Top Risks for the Next Decade: A Global Perspective (2021)

This issue of Board Perspectives summarizes seven key takeaways from Protiviti’s Executive Perspectives on Top Risks in ...
Subscriber Content
Mon, May 31, 2021
Benchmarking Tools

Data Integrity Risk Key Performance Indicators (KPIs)

What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Mon, May 10, 2021
Audit Programs

Data Privacy Audit Work Program

This work program sample highlights general steps an organization should follow with respect to effective data privacy.
Subscriber Content
Mon, Apr 26, 2021
Performer Profiles

Microsoft Corporation: Leading With What’s Next in Agile Auditing

In this profile, Michael Williams, group IT audit program manager at Microsoft, explains how his team has leveraged agil...
Subscriber Content
Mon, Apr 26, 2021
Memos

IT Network Security Scope Memo

The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Mon, Apr 19, 2021
Articles

Architecting Your Cloud Infrastructure for Failure (and Resilience)

This article notes five keys to architecting for failure that firms should consider to meet the evolving threat and regu...
Subscriber Content
Mon, Apr 5, 2021
Policies & Procedures

Data Classification Standard Policy

This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content
Mon, Mar 15, 2021