Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
|
|
Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...
|
|
Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...
|
|
Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.
|
|
This Blueprint will help you establish a well-designed system of internal controls that helps the IT department operate as intended by mitigating its greatest risks.
|
|
The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...
|
|
This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.
|
|
The Data Source Inventory Tool will help you document relevant information pertaining to each data source to act as a point of reference document.
|
|