The following 184 items are listed by Content Data.
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Subscriber Content
Policies & Procedures
Network Security Policy
Our Network Security Policy is designed to help companies protect their user accounts, corporate data and intellectual p...
Subscriber Content
Policies & Procedures
Access Management Policy
Ensure that access to all your organization’s systems and applications is properly approved and monitored with our Acces...
Subscriber Content
Blog
New Content on KnowledgeLeader - 4/22/2024
ToolsThe following tools were published on KnowledgeLeader this week:Management Reporting: Purchasing ...
Blog
Sample Memos Available on KnowledgeLeader
These audit memos are powerful tools for documenting an organization's audit plan during the initial phases...
Audit Reports
Expenditure Process Review Report
Our Expenditure Process Review Report includes a future-state design to consider when reviewing your organization’s expe...
Subscriber Content
Policies & Procedures
Intranet and Internet Security Policy
This tool contains two sample policies that outline guidelines for a company's internet and intranet security.
Subscriber Content
Policies & Procedures
IT Data Management Policy
Our IT Data Management Policy outlines guidelines to ensure that critical data stored in applications and on servers is ...
Subscriber Content
Blog
New Content on KnowledgeLeader - 3/25/2024
ToolsThe following tools were published on KnowledgeLeader this week:IT Data Management PolicyOur IT D...
Methodologies & Models
IT Operations Capability Maturity Model (CMM)
Discover how this capability maturity model can enhance your organization’s IT operations management process.
Subscriber Content
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Articles
Human Performance Measures for Cybersecurity Operations Centers
This article offers an overview of a variety of different dimensions for measuring an analyst’s performance.
Subscriber Content