Avoid the PIA Trap, Integrate PbD Early in Your AppDev Process

Accelerate your application’s GDPR compliance with data protection by design.

Legitimate Interest Assessment Template

Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.

A Guide to Data Subject Access Requests

To enable effective execution of compliance to the GDPR, the Data Subject Access Request procedure within the organization should be aligned to the requirements specified...

Improve Security Governance With a Security Steering Committee

Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
  • guided implementation icon

Improve Security Governance With a Security Steering Committee – Executive Brief

Read this Executive Brief to understand why a security steering committee is different than an IT steering committee but just as valuable.

Improve Security Governance With a Security Steering Committee – Phases 1-3

This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.

Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.

Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and...

Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...

Combine Security Risk Management Components Into One Program – Phase 4: Communicate the Risk Management Program

This phase of the blueprint will help you report on risk based on the requirements needed within your organization.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us