The following 129 items are listed by Content Data.
Audit Reports
Expenditure Process Review Report
Our Expenditure Process Review Report includes a future-state design to consider when reviewing your organization’s expe...
Subscriber Content
Audit Programs
System Post-Implementation Audit Work Program
Organizations can use the three audit program samples in this tool to assess the usage, supporting information technolog...
Subscriber Content
Policies & Procedures
IT System Development Lifecycle (SDLC) Methodology Policy
This policy defines the methodologies and processes for the effective implementation of application development projects...
Subscriber Content
Policies & Procedures
IT Support Policy
Explore our detailed IT support policy for employees, covering request submission, urgent assistance after hours and iss...
Subscriber Content
Charters
IT Project Charter
This sample establishes guidelines for creating an IT project charter.
Subscriber Content
Articles
Aiming for Impact, Ripple CBDC Lead Says Proliferation of Digital Currencies Not to Be Feared
Ripple CBCD Senior Director of Client Solutions and Delivery Ross Edwards and Protiviti’s Lata Varghese discuss technolo...
Subscriber Content
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Articles
Mastering the Interplay: The Role and Culture of a Cyber Physical Security (CPS) Professional in Global Cybersecurity Teams
This article explores the dynamic world of cyber physical security professionals within global cybersecurity frameworks.
Subscriber Content
Blog
New Content on KnowledgeLeader - 1/29/2024
ToolsThe following tools were published on KnowledgeLeader this week:Data Management PolicyThis Data M...
Benchmarking Reports
Executive Perspectives on Top Risks for 2024 and a Decade Later
The 12th annual Top Risks Survey report highlights top-of-mind issues for directors and executives around the globe over...
Subscriber Content
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Subscriber Content
Articles
Human Performance Measures for Cybersecurity Operations Centers
This article offers an overview of a variety of different dimensions for measuring an analyst’s performance.
Subscriber Content