The following 689 items are listed by Content Data.
Checklists & Questionnaires
Business Continuity Management Self-Assessment Questionnaire
This a self-assessment tool to use prior to a review of the business continuity management process. It gives the auditee...
Subscriber Content
Newsletters
Updated COSO Internal Control Framework: Frequently Asked Questions
Get answers to FAQs on the design and evaluation of the COSO cube. Discover the impact of the updated COSO Internal Cont...
Subscriber Content
Newsletters
Shaping the 2013 Risk Oversight Agenda
This issue of Board Perspectives: Risk Oversight discusses 10 questions for boards to consider as reminders as they eval...
Subscriber Content
Newsletters
Setting the 2013 Audit Committee Agenda
This issue of The Bulletin provides observations and ideas for consideration by boards of directors and their audit comm...
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 8
In this booklet, we detail internal audit best practices, processes and strategies being employed at some of the world’s...
Subscriber Content
Audit Programs
Retail Audit Work Program
This work program provides retailers with an overview of operational audit steps to ensure compliance with key regulatio...
Subscriber Content
Newsletters
Setting the 2012 Audit Committee Agenda for Non-Financial Services Companies
In this issue of The Bulletin, we provide observations for boards of directors and their audit committees to consider wh...
Subscriber Content
Newsletters
Refocusing the Internal Audit Agenda: Capitalizing on Changing Expectations
In this issue of The Bulletin, we explore some of the factors that are driving higher expectations for internal audit an...
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 7
In this booklet, we profile companies that are taking steps to integrate ERM into processes for formulating and executin...
Subscriber Content
Policies & Procedures
Security of Data Policy (with UNIX Example)
The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 6
In this booklet, we profile nine international companies that value technology-based audit and data analysis techniques ...
Subscriber Content
Newsletters
Setting the 2010 Audit Committee Agenda
In this issue of The Bulletin, we provide 10 major challenges for board members to consider as they set the 2010 audit c...
Subscriber Content