This tool will help to identify content that should be covered by your security awareness and training program.
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
The Data Source Inventory Tool will help you document relevant information pertaining to each data source to act as a point of reference document.
|
|
Data owners, data stewards, and end users are the ones who use the data on a day-to-day basis and will be able to provide the best information regarding ongoing data...
|
|
Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.
|
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
|
This Blueprint will help you establish a well-designed system of internal controls that helps the IT department operate as intended by mitigating its greatest risks.
|
|
This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.
|
|
The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...
|
|
Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.
|
|