Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...
|
|
Use this tool in phase 1 of the Responsibly Resume IT Operations in the Office research to evaluate and better understand the organization's post-pandemic risk tolerance.
|
|
The Mid-Pandemic IT Prioritization Tool simplifies the long to-do list of transition tasks for your IT and InfoSec team to carry out. Identify, classify, and prioritize...
|
|
Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and...
|
|
Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.
|
|
This tool will help you determine your security program goals and develop a key performance indicators to measure your progress on those goals.
|
|
This tool will help you practice developing key performance indicators for various types of metrics based on your program's goals.
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.
|
|
The Information Security Program Gap Analysis Tool will help you systematically understand your current security state.
|
|
Use this tool to help define and track a due diligence workflow for managing cybersecurity during an M&A.
|
|