The following 139 items are listed by Content Data.
Memos
Mobile Device Procurement Memo
This memo outlines an internal audit review of an organization's mobile device procurement process.
Subscriber Content
Risk & Control Matrices - RCMs
Define IT Strategy and Organization RCM
This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Audit Programs
Commercial Property Lease Application Audit Work Program
This audit program reviews an application that handles transactions related to leasing and renting commercial property.
Subscriber Content
Risk & Control Matrices - RCMs
Deploy and Maintain Solutions RCM
This document outlines risks and controls common to the "deploy and maintain solutions" process in a risk control matrix...
Subscriber Content
Audit Programs
IT Help Desk Audit Work Program
This document outlines steps to audit an organization’s IT help desk process.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Audit Programs
IT Platform Management Audit Work Program
This document outlines steps to audit an organization’s IT platform management process.
Subscriber Content
Process Flows
IT Change Management Process Flow
To regulate information technology (IT) changes from beginning to end, it’s important to have an IT change management pr...
Subscriber Content
Checklists & Questionnaires
Business Continuity Management Self-Assessment Questionnaire
This a self-assessment tool to use prior to a review of the business continuity management process. It gives the auditee...
Subscriber Content
Protiviti Booklets
Spreadsheet Risk Management: Frequently Asked Questions
This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Blog
How to Conduct an Up-to-Date Information Security Audit
The point of the article, of course, was that people must focus their attention in the correct places when ...