IT Security

The following 212 items are listed by Content Data.
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 14, 2023
Audit Programs

Business Continuity Management Audit Work Program

This BCM work program includes two samples that will help you assess the effectiveness of your BCM program and identify ...
Subscriber Content
Mon, Jul 17, 2023
Policies & Procedures

IT Acquisition and Divestiture Policy

This policy can be used to define requirements for the integration of or separation from a company.
Subscriber Content
Mon, Jul 17, 2023
Audit Programs

Data Center Review Audit Work Program

This sample document contains two work programs that outline general steps organizations should take during a data cente...
Subscriber Content
Mon, Jul 10, 2023
Policies & Procedures

Disclosure of Private Data Policy

This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content
Mon, Jun 12, 2023
Policies & Procedures

IT Change Management Policy

This document contains multiple sample policies that provide an overview of procedures organizations should perform duri...
Subscriber Content
Mon, Jun 12, 2023
Policies & Procedures

IT Security Policy

Protect your organization's IT assets with the standard best practices included in our IT policies and procedures.
Subscriber Content
Mon, May 29, 2023
Audit Programs

Network Infrastructure Audit Work Program

This document contains three sample work programs that can be used by organizations for conducting an IT network infrast...
Subscriber Content
Mon, May 29, 2023
Audit Programs

Privacy Audit Work Program

This tool contains two sample work programs that highlight risks to consider and general steps to take when facilitating...
Subscriber Content
Mon, May 29, 2023
Audit Programs

IT Organization Audit Work Program

This tool contains two work program samples that highlight best-practice steps for the IT audit process.
Subscriber Content
Mon, May 15, 2023
Audit Programs

Application Controls Audit Work Program

The two samples included in this Application Controls Audit Work Program will help organizations ensure that information...
Subscriber Content
Mon, May 8, 2023
Articles

ISO 27001: 2022 – Key Changes and Approaches to Transition

A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Mon, Apr 3, 2023