The following 205 items are listed by Content Data.
Articles
The Three C’s of a Quality Cloud Audit
This article outlines Protiviti's comprehensive cloud audit approach, which is based on leading practices and frameworks...
Subscriber Content
Audit Programs
Vulnerability Assessment Audit Work Program
This audit program sample offers best-practice general steps for a vulnerability assessment audit, including key objecti...
Subscriber Content
Articles
Gone Phishing: Elaborate Scams Are on the Rise, Are You Smart Enough to Recognize Them?
Protiviti Managing Director Michael Lyons shares a personal experience with, and an in-depth analysis of, a sophisticate...
Subscriber Content
Audit Programs
Treasury Security Review Audit Work Program
In this work program sample, we provide general best-practice steps for the treasury security review audit process.
Subscriber Content
Policies & Procedures
Encryption Key Policy
This tool contains two sample policies that establish guidelines for use of encryption to secure company information ass...
Subscriber Content
Articles
Importance of Internal Controls for Cybersecurity
Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Audit Programs
Intranet Audit Work Program
This work program sample highlights general steps an organization should follow when performing an intranet audit.
Subscriber Content
Articles
To Meet Today’s Challenges, CAEs Must Stay Focused on Next-Gen Internal Audit Practices
This article explains how audit leaders can initiate and maintain next-generation capabilities in today's dynamic enviro...
Subscriber Content
Audit Programs
Data Privacy Audit Work Program
This work program sample highlights general steps an organization should follow with respect to effective data privacy.
Subscriber Content
Memos
IT Network Security Scope Memo
The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Policies & Procedures
Data Classification Standard Policy
This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content