The following 288 items are listed by Content Data.
Audit Programs
IT Project Governance Audit Work Program
This audit work program outlines steps for executing an IT project governance audit.
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Audit Programs
EDI Audit Work Program
Explore our EDI Audit Work Program to master the setup, testing and oversight of secure data exchanges between clients a...
Audit Programs
Vendor Review Audit Work Program
Improve your company’s vendor management process with the best-practice steps in this audit program sample.
Policies & Procedures
Sustainability Policy
Develop a clear framework for integrating sustainability principles into all levels of company operations with this sust...
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Policies & Procedures
Software Upgrade Policy
Identify and define your company's philosophy toward maintaining up-to-date software applications with this sample polic...
Audit Programs
System Intrusion Audit Work Program
Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Benchmarking Reports
Executive Perspectives on Top Risks for 2024 and a Decade Later: From AI to Cyber — Deconstructing a Complex Technology Risk Landscape
Why auditors need to adopt new strategies and increase audit frequency to stay ahead in an evolving environment.
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Audit Reports
IT Audit Update: Audit Committee Report
Utilize this audit report sample to evaluate your organization’s general computer control risks and report on the progre...
Checklists & Questionnaires
Data Center General Controls Questionnaire
Use this questionnaire to meticulously evaluate your mainframe data center's operational controls and enhance security, ...