The following 189 items are listed by Content Data.
Process Flows
IT Change Management Process Flow
To regulate information technology (IT) changes from beginning to end, it’s important to have an IT change management pr...
Subscriber Content
Guides
COSO Internal Controls Guide: Integrated Framework
Design and implement your organization’s internal controls with the COSO internal control framework included in this gui...
Subscriber Content
Protiviti Booklets
Guide to the Sarbanes-Oxley Act: IT Risks and Controls
In this booklet, we provide guidance to Section 404 compliance project teams on the consideration of information technol...
Subscriber Content
Policies & Procedures
User Authentication and Authorization Policy
The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Newsletters
Social Media: What It Means to Your Risk Profile
In this issue of Board Perspectives: Risk Oversight, we reveal 10 examples of business risks to consider associated with...
Subscriber Content
Process Flows
User Access Security Process Flow
This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 6
In this booklet, we profile nine international companies that value technology-based audit and data analysis techniques ...
Subscriber Content
Protiviti Booklets
Spreadsheet Risk Management: Frequently Asked Questions
This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content
Protiviti Booklets
Guide to the Sarbanes-Oxley Act
The questions answered in this booklet have risen in our discussions with clients and others in the marketplace who freq...
Subscriber Content
Newsletters
Wanted: A Cost-Effective Approach to Validating Performance of the Internal Control Structure
This issue of The Bulletin addresses the importance of integrating self-assessment, entity-level monitoring, and indepen...
Subscriber Content
Newsletters
Technology Risks and Controls: What You Need to Know
In this issue of The Bulletin, we focus on the relevance of IT risks and controls to a company’s meeting the internal co...
Subscriber Content
Blog
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...