Demonstrate Data Protection by Design for IT Systems – Phase 1: Determine What Data Protection by Design Means for You

This phase of the blueprint, Demonstrate Data Protection by Design for IT Systems, will help you use the PbD and DPbD frameworks and help you understand how they apply to...

Demonstrate Data Protection by Design for IT Systems – Phases 1-2

Privacy is fast becoming a non-negotiable part of information security. Being able to demonstrate how your organization designs its systems for privacy will give you an...

Ensure Your Pandemic Response Plan Is Privacy-Proof Storyboard

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time-sensitive, scalable,...

Build a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Build a Data Privacy Program – Phase 1: Collect Privacy Requirements

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the key drivers and expectations of privacy from all areas of your organization.

Build a Data Privacy Program – Phases 1-4

Sell privacy to the business by speaking a language they understand. Take a quantitative approach to integrating privacy within the scope of your organization and build a...

Build a Data Privacy Program – Phase 4: Implement and Operationalize

This phase of the blueprint, Build a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...

Secure Your High-Risk Data: Phase 2 – Build the Data Security Plan

Begin to close the gaps in your organization’s data security plan by creating a prioritized roadmap of targeted initiatives that cover data-at-rest, in-transit, and in-use

Secure Your High-Risk Data – Phases 1-3

Info-Tech’s Secure Your High-Risk Data takes a multi-faceted approach to the challenges around comprehensive data security. This research incorporates foundational...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us