Security Risk, Strategy & Governance

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Subject Access Request (SAR) Registry Tool

Use this tool as a starting point to track all types of subject access requests throughout the process.

AU10TIX Receives a $60-Million Investment From TPG Capital

AU10TIX, an identity verification and biometric onboarding company, received a $60-million investment from TPG Capital, valuing the company at $260 million.

What You Need to Know About CyberSecure Canada Certification

A brief research note for Info-Tech’s Canadian members.

Trend Micro Partners With NINJIO, InfoSec, GoldPhish, and NextTech Security to Offer Free Training Content

Trend Micro has added training content to its free Phish Insight tool, originally a simple, cloud-based phishing platform. The new training content comes from...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us