IT Infrastructure

The following 139 items are listed by Content Data.
Memos

Mobile Device Procurement Memo

This memo outlines an internal audit review of an organization's mobile device procurement process.
Subscriber Content
Mon, Apr 25, 2016
Risk & Control Matrices - RCMs

Define IT Strategy and Organization RCM

This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Mon, Feb 29, 2016
Audit Programs

Commercial Property Lease Application Audit Work Program

This audit program reviews an application that handles transactions related to leasing and renting commercial property.
Subscriber Content
Mon, Sep 28, 2015
Risk & Control Matrices - RCMs

Deploy and Maintain Solutions RCM

This document outlines risks and controls common to the "deploy and maintain solutions" process in a risk control matrix...
Subscriber Content
Mon, Jun 1, 2015
Audit Programs

IT Help Desk Audit Work Program

This document outlines steps to audit an organization’s IT help desk process.
Subscriber Content
Mon, May 18, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Audit Programs

IT Platform Management Audit Work Program

This document outlines steps to audit an organization’s IT platform management process.
Subscriber Content
Mon, May 11, 2015
Process Flows

IT Change Management Process Flow

To regulate information technology (IT) changes from beginning to end, it’s important to have an IT change management pr...
Subscriber Content
Mon, Nov 10, 2014
Checklists & Questionnaires

Business Continuity Management Self-Assessment Questionnaire

This a self-assessment tool to use prior to a review of the business continuity management process. It gives the auditee...
Subscriber Content
Mon, Jun 3, 2013
Protiviti Booklets

Spreadsheet Risk Management: Frequently Asked Questions

This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content
Mon, Jul 6, 2009
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Tue, Feb 18, 2020
Blog

How to Conduct an Up-to-Date Information Security Audit

The point of the article, of course, was that people must focus their attention in the correct places when ...
Mon, Mar 16, 2020