The following 311 items are listed by Content Data.
Audit Reports
Security Assessment Audit Report
This sample report presents the results of an organization's information security audit.
Subscriber Content
Internal Audit CPE Courses
Introduction to Information Technology (IT) Audit (KLplus CPE Course)
The objective of this course is to provide internal auditors with a basic understanding of the IT environment and the as...
Protiviti Booklets
Internal Auditing Around the World: Volume 14
In Volume XIV of Protiviti’s Internal Auditing Around the World, we take a closer look at internal auditors’ challenges ...
Subscriber Content
Checklists & Questionnaires
Update Testing: Control Self-Assessment Questionnaire
This questionnaire helps to assess if the controls are operating effectively within a business unit.
Subscriber Content
Checklists & Questionnaires
General IT Controls Review: Passwords Questionnaire
This tool provides questions to consider while reviewing general IT controls password standards.
Subscriber Content
Checklists & Questionnaires
Self-Assessment Questionnaire: IT Security Remediation
This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Audit Reports
Pre-Year 1 SOX Roadmap Audit Report
This audit report summarizes the observations, recommendations, and related remediation prioritization for business and ...
Subscriber Content
Policies & Procedures
Workstation Use Policy
This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Audit Reports
Pre-Audit Readiness Audit Report
This report provides findings from a pre-audit readiness review of an organization’s financial statements and other key ...
Subscriber Content
Policies & Procedures
Sensitive Data Handling Policy
The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Newsletters
How Long Does It Take to Implement a Patch?
A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content