The following 206 items are listed by Content Data.
Policies & Procedures
Facility Access Controls Policy
This sample policy provides an overview of procedures organizations should perform during the facility access controls p...
Subscriber Content
Articles
Healthcare Key Issues Bulletin: Issue No. 9
This industry bulletin highlights recent significant issues and changes within the healthcare industry and provides solu...
Subscriber Content
Internal Audit CPE Courses
IA Beginner Data Analytics (KLplus CPE Course)
This training will provide you with a basic understanding of data analytics and the key concepts related to it.
Audit Reports
Privacy and Data Sensitivity Audit Report
This audit report focuses on the process of ensuring that effective controls are in place for the handling of sensitive ...
Subscriber Content
Audit Reports
Privacy Compliance Program Review Audit Report
This sample report focuses on the privacy compliance state at a financial institution and uses a capability maturity con...
Subscriber Content
Protiviti Booklets
FAQ: Understanding the General Data Protection Regulation
Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Audit Reports
ISO 27001 Information Security Assessment Report
This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Newsletters
Sharpening the Focus on Cybersecurity
This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
This tool provides questions to consider when evaluating risks related to privacy/data protection and accumulated privac...
Subscriber Content