Build Your Data Security Armor to Withstand Attacks and Audits – Phase 1: Build Your Data Security Profile

Author(s): Brian King, Crystal Singh

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

This phase, Build your Data Security Profile, will help you to build an enterprise-wide data security policy, which will set the foundation for the organization's data security strategy.

This phase will take you through the following activities:

  • Understand the importance of data security and your organization's rationale for creating an air-tight data security policy.
  • Understand who your data stakeholders are and their responsibilities.
  • Determine the relevant regulations and laws that apply to your organization, which will inform your security policy.
  • Inventory and classify your organization's data.
  • Create the organization's enterprise-wide data security policy, based on its data security profile.

Use this phase as part of the full blueprint, Build Your Data Security Armor to Withstand Attacks and Audits.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019