The following 212 items are listed by Content Data.
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Audit Programs
Business Continuity Management Audit Work Program
This BCM work program includes two samples that will help you assess the effectiveness of your BCM program and identify ...
Subscriber Content
Policies & Procedures
IT Acquisition and Divestiture Policy
This policy can be used to define requirements for the integration of or separation from a company.
Subscriber Content
Audit Programs
Data Center Review Audit Work Program
This sample document contains two work programs that outline general steps organizations should take during a data cente...
Subscriber Content
Policies & Procedures
Disclosure of Private Data Policy
This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content
Policies & Procedures
IT Change Management Policy
This document contains multiple sample policies that provide an overview of procedures organizations should perform duri...
Subscriber Content
Policies & Procedures
IT Security Policy
Protect your organization's IT assets with the standard best practices included in our IT policies and procedures.
Subscriber Content
Audit Programs
Network Infrastructure Audit Work Program
This document contains three sample work programs that can be used by organizations for conducting an IT network infrast...
Subscriber Content
Audit Programs
Privacy Audit Work Program
This tool contains two sample work programs that highlight risks to consider and general steps to take when facilitating...
Subscriber Content
Audit Programs
IT Organization Audit Work Program
This tool contains two work program samples that highlight best-practice steps for the IT audit process.
Subscriber Content
Audit Programs
Application Controls Audit Work Program
The two samples included in this Application Controls Audit Work Program will help organizations ensure that information...
Subscriber Content
Articles
ISO 27001: 2022 – Key Changes and Approaches to Transition
A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content