The following 186 items are listed by Content Data.
Policies & Procedures
IT Contingency Planning Policy
The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Policies & Procedures
Internet Usage Policy
This tool includes four sample policies that define a company’s guidelines and procedures related to employee use of the...
Subscriber Content
Benchmarking Reports
2021 Finance Trends Survey Report: Consumer Products and Retail Industry Group
This report contains several key priorities for retail and CPG finance leaders to consider, based on the results from Pr...
Subscriber Content
Policies & Procedures
IT Equipment and Information Control Policy
This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Reference and Master Data Management RCM
This document outlines risks and controls common to reference and master data management in a risk control matrix (RCM) ...
Subscriber Content
Newsletters
Ransomware: Analyzing Risk and Protecting Critical Assets
In this issue of Board Perspectives, we provide four ways boards can respond strategically to ransomware exposures.
Subscriber Content
Policies & Procedures
Systems Audit Logging and Monitoring Policy
This sample policy is designed to help organizations define and comply with system audit logging and monitoring requirem...
Subscriber Content
Benchmarking Tools
Transaction Authority Risk Key Performance Indicators (KPIs)
This tool contains performance measures and questions an organization can use to enforce and ensure the validity of tran...
Subscriber Content
Audit Programs
Application Security Review and Testing Audit Work Program
This tool includes two sample audit programs that provide steps organizations can take to facilitate an application secu...
Subscriber Content
Policies & Procedures
Separation of Duties Policy
In this sample policy, we outline the standards for applying separation of duties to protect a company’s information ass...
Subscriber Content
Policies & Procedures
Telecommunication Usage Policy
This sample policy defines guidelines and procedures organizations should follow when using telecommunications systems.
Subscriber Content
Newsletters
Ransomware: Preventing an Attack and Responding to and Recovering From an Attack
This issue of The Bulletin focuses on the six components of cyber resilience and provides countermeasures businesses can...
Subscriber Content