|
Use this Excel tool as the repository for security and privacy risks in high-risk jurisdictions. Describe the risk profile of key risk scenarios, analyze your risk...
|
|
|
Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and ensure...
|
|
|
Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.
|
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.
|
|
|
The Information Security Program Gap Analysis Tool will help you systematically understand your current security state.
|
|
|
Use this tool to help define and track a due diligence workflow for managing cybersecurity during an M&A.
|
|
|
Use this tool to determine which employees should be selected for layoff and in which order of priority.
|
|
|
This tool will help you to work through your cost optimization decisions related to people, process, and technology.
|
|
|
Use this tool to identify which risk categories are of primary concern to your organization based on your internal and external environment, as well as set of predefined...
|
|
|
Use the Cloud Security Architecture Workbook to understand the risks, effort and mitigating services that you can use when moving your workloads to the cloud. The process...
|
|