The following 199 items are listed by Content Data.
Protiviti Booklets
U.S. Anti-Money Laundering Requirements
This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Policies & Procedures
Workstation Use Policy
This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Policies & Procedures
Sensitive Data Handling Policy
The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Audit Reports
Cybersecurity Audit Report
This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Newsletters
Board Oversight of Cyber Risk
Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Policies & Procedures
User Information Security Policy
This sample policy provides guidelines for securing user information.
Subscriber Content
Memos
Delegated Entity Review Memo
This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Memos
Data Breach Notification Memo
This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Audit Programs
System Backup Review Audit Work Program
The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Audit Programs
Security Policy Review Audit Work Program
The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Newsletters
Social Business: What it Means to Your Risk Profile
This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content