This phase of the blueprint will help you perform and manage data discovery.
|
|
Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.
|
|
Issuing an RFP to vendors is a critical step in your email security gateway solution selection process.
|
|
Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
Use this storyboard to develop an information security governance and management model and implement essential governance processes.
|
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|