The following 116 items are listed by Content Data.
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Policies & Procedures
IT Contingency Planning Policy
The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Metadata Management RCM
This document outlines risks and controls common to metadata management in a risk control matrix (RCM) format.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Reference and Master Data Management RCM
This document outlines risks and controls common to reference and master data management in a risk control matrix (RCM) ...
Subscriber Content
Benchmarking Tools
Transaction Authority Risk Key Performance Indicators (KPIs)
This tool contains performance measures and questions an organization can use to enforce and ensure the validity of tran...
Subscriber Content
Performer Profiles
FIS: Leveraging the Power of Emerging Technology for Greater Assurance
In this profile, FIS Chief Audit Executive John Eagle shares how his team utilizes advanced technology to focus on ongoi...
Subscriber Content
Audit Programs
Intranet Audit Work Program
This work program sample highlights general steps an organization should follow when performing an intranet audit.
Subscriber Content
Benchmarking Tools
Data Integrity Risk Key Performance Indicators (KPIs)
What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Benchmarking Tools
Records Management Risk Key Performance Indicators (KPIs)
This tool contains key performance indicators and questions an organization can use to evaluate its record management pr...
Subscriber Content
Benchmarking Tools
System Design Risk Key Performance Indicators (KPIs)
This tool includes key performance indicators and questions an organization should use to evaluate and manage its system...
Subscriber Content
Policies & Procedures
Enterprise Assessment and Monitoring Policy
The purpose of this policy is to develop a consistent method for scheduling and managing company IT security assessment ...
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content