Tagged - Policy

Establish an Effective System of Internal IT Controls to Mitigate Risks

An effective system of internal IT controls helps the IT department operate as intended by mitigating risks and ensuring that the organization is in compliance with...
  • guided implementation icon

Internal Controls Monitoring RACI Template

Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

Internal Controls Effectiveness Scorecard

The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...

Storyboard: Establish an Effective System of Internal IT Controls to Mitigate Risks

This Blueprint will help you establish a well-designed system of internal controls that helps the IT department operate as intended by mitigating its greatest risks.

End-User Computing Focus Group Survey

Gain a better grasp on what end users expect from end-user computing.

End-User Computing Strategy and Roadmap TCO Calculator

End-user computing options grow more and more complex. Estimate costs and keep on budget using a five-year TCO calculator.

Data Provenance Policy

The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through improper sourcing, misuse,...

Data Entry Policy

The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of the organization.

Building an Enterprise IT Security Training Program

Over 50% of security breaches are a result of end-user error, oversight, and ignorance. IT security training is an effective method of reducing end-user related security...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us