The following 199 items are listed by Content Data.
Audit Reports
ISO 27001 Information Security Assessment Report
This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Audit Reports
Data Privacy Maturity Audit Report
This report provides findings from the data privacy maturity assessment at any given company.
Subscriber Content
Articles
Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics
Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Checklists & Questionnaires
System Privileges for Terminated Employees Checklist
This sample provides action steps to consider for protecting an organization’s critical systems and data and secure syst...
Subscriber Content
Checklists & Questionnaires
Self-Assessment Questionnaire: IT Security Remediation
This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Newsletters
The Cyber Risk Oversight Challenge
Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content