Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Cio icon

Take Control of Compliance Improvement to Conquer Every Audit

Don’t gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.

  • Most enterprises view compliance as a "must-do" expense rather than a "should-do," value-added activity.
  • IT is often left out of compliance discussions and is unaware of compliance requirements or non-compliance gaps.
  • Organizations generally wait to improve compliance until mandated changes are dictated following an adverse audit or assessment.

Our Advice

Critical Insight

  • Don’t gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.
  • Take an agile approach to analyze your gaps and prioritize your remediations. You don’t always have to be fully compliant as long as your organization understands and can live with the consequences.

Impact and Result

Approach compliance proactively and derive value from the process by managing your compliance initiatives using a constant cycle.

  • You need to initiate the drive to conform with regulations and improve compliance.
  • You need to consistently assess the regulatory and business landscape to determine your compliance gaps.
  • You need to improve compliance and remediate non-compliance in an effective, tactical manner.
  • You need to confirm and assure compliance through regular adherence checks.

Info-Tech’s framework presented in this blueprint is compliant with COBIT MEA03 – Monitor, Evaluate, and Assess Compliance with External Compliance.


Take Control of Compliance Improvement to Conquer Every Audit Research & Tools

1. Launch the project

Make the case and launch the compliance project.

2. Perform a gap analysis

Identify compliance requirements and prioritize non-compliance gaps.

3. Remediate non-compliance gaps

Improve non-compliance and document management gaps.

4. Confirm compliance

Assure and confirm compliance through interviews and audits.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

7.0/10


Overall Impact

$2,599


Average $ Saved

5


Average Days Saved

Client

Experience

Impact

$ Saved

Days Saved

State of Wyoming

Guided Implementation

7/10

$2,599

5

Love having a sounding board who can readily digest my challenges and offer their own experiences of what has worked for them in the past. Would h... Read More


External Compliance

Don't gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.
This course makes up part of the Security & Risk Certificate.

  • Course Modules: 5
  • Estimated Completion Time: 2-2.5 hours
  • Featured Analysts:
  • David Yackness, Sr. Research Director, CIO Practice
  • James Alexander, SVP of Research and Advisory, CIO Practice

Now Playing:
Academy: External Compliance | Executive Brief

An active membership is required to access Info-Tech Academy
Take Control of Compliance Improvement to Conquer Every Audit preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

MEMBER RATING

7.0/10
Overall Impact

$2,599
Average $ Saved

5
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 4-phase advisory process. You'll receive 9 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Launch
  • Call 1: Make the case
  • Call 2: Launch the project

Guided Implementation 2: Gap Analysis
  • Call 1: Identify regulatory requirements
  • Call 2: Conduct gap analysis
  • Call 3: Prioritize gaps

Guided Implementation 3: Remediation
  • Call 1: Develop remediations
  • Call 2: Improve evidentiary document management

Guided Implementation 4: Confirmation
  • Call 1: Confirm compliance
  • Call 2: Introduction to audit

Authors

Josh Mendelssohn

Dana Tessler

Contributors

  • Heriot Prentice, Director of Technology Operations Review, Brown & Brown
  • Glen Notman, Associate Partner, Citihub
  • Tony Noblett, SVP CISO, Urban Lending Solutions
  • Carter Cameron-Huff, Consultant, Enterprise Risk Services, MNP LLP
  • Ashley Moore, Policy & Planning Program Director, Broadcasting Board of Governors
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019