Align your security projects properly by clearly defining business needs, and customer/compliance obligations, as well as documenting scope, boundaries, and risk tolerance.
|
|
Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the...
|
|
A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...
|
|
Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and...
|
|
Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.
|
|
Use this tool to help track and demonstrate the organizational goals your security program supports.
|
|
Use this tool to create a visual representation of your governance structure.
|
|
Use this tool in phase 1 of the Responsibly Resume IT Operations in the Office research to evaluate and better understand the organization's post-pandemic risk tolerance.
|
|
The Mid-Pandemic IT Prioritization Tool simplifies the long to-do list of transition tasks for your IT and InfoSec team to carry out. Identify, classify, and prioritize...
|
|
Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...
|
|