IT Audit

The following 311 items are listed by Content Data.
Audit Reports

Security Assessment Audit Report

This sample report presents the results of an organization's information security audit.
Subscriber Content
Mon, Jun 25, 2018
Internal Audit CPE Courses

Introduction to Information Technology (IT) Audit (KLplus CPE Course)

The objective of this course is to provide internal auditors with a basic understanding of the IT environment and the as...
Mon, Jun 11, 2018
Protiviti Booklets

Internal Auditing Around the World: Volume 14

In Volume XIV of Protiviti’s Internal Auditing Around the World, we take a closer look at internal auditors’ challenges ...
Subscriber Content
Mon, Jun 4, 2018
Checklists & Questionnaires

Update Testing: Control Self-Assessment Questionnaire

This questionnaire helps to assess if the controls are operating effectively within a business unit.
Subscriber Content
Mon, May 28, 2018
Checklists & Questionnaires

General IT Controls Review: Passwords Questionnaire

This tool provides questions to consider while reviewing general IT controls password standards.
Subscriber Content
Mon, May 21, 2018
Checklists & Questionnaires

Self-Assessment Questionnaire: IT Security Remediation

This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Mon, Apr 30, 2018
Audit Reports

Pre-Year 1 SOX Roadmap Audit Report

This audit report summarizes the observations, recommendations, and related remediation prioritization for business and ...
Subscriber Content
Mon, Feb 19, 2018
Policies & Procedures

Workstation Use Policy

This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Mon, Jan 22, 2018
Audit Reports

Pre-Audit Readiness Audit Report

This report provides findings from a pre-audit readiness review of an organization’s financial statements and other key ...
Subscriber Content
Mon, Jan 1, 2018
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Newsletters

How Long Does It Take to Implement a Patch?

A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content
Mon, Dec 4, 2017