policies

Address Security and Privacy Risks for Generative AI

Blueprint: Security

This research will help security leaders seeking to better understand the risks associated with using generative AI and will walk them through how to manage those risk in the short and long term.

AI Security Policy Template

Tool: Security

Use this policy template as the basis of your AI security policy.

Generative AI Risk Map

Tool: Security

Use this tool to determine your data-security risks and recommended policy statements for using generative AI.

Improve OT Governance to Drive Business Results

Blueprint: Industry Coverage

This blueprint provides a high-level analysis, insights, tools, and recommendations for implementing and maintaining an OT governance methodology that will drive business value and ensure the company can safely scale and maintain equipment across the business.

OT Governance Planning Risk Register

Tool: Industry Coverage

Capture and manage risks associated with OT governance change management.

Develop and Deploy Security Policies

Blueprint: Security

Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities or compliance requirements, and they are rarely comprehensive. Without a strong lifecycle to keep policies up to date and easy to use, end users will ignore or work around poorly...

Security Policy Assessment Tool

Tool: Security

The Security Policy Assessment Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement, and Ease to Enforce.

Security Policy Prioritization Tool

Tool: Security

The Security Policy Prioritization Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement and Ease to Enforce.

Review and Improve Your IT Policy Library

Blueprint: CIO

IT policies are necessary from a risk mitigation perspective, but they are often left as an afterthought by the business. As a result, IT policies often do not adequately mitigate risks, have fallen out of date, and are not well known or adhered to by employees.

Policy Management Tool

Tool: CIO

Info-Tech's Policy Management Tool is designed to help you quickly identify the key risks your organization faces, map them to a policy, and identify gaps and deficiencies in your current policies.​

Tackle Data Quality Issues

Blueprint:

This solution set will help you understand the causes of data quality problems and provide strategies to fix the causes of data quality problems, and not just address the symptoms.

Master Data Record Tool

Tool: Data & Business Intelligence

Leverage the Master Data Record Tool to catalogue systems within the organization to help you determine with which data set you should begin your MDM initiative.

Mergers & Acquisitions: The Buy Blueprint

Blueprint: CIO

IT has always been an afterthought in the M&A process. IT needs to stop waiting to be invited to the acquisition table. They need to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.

IT Culture Diagnostic

Tool: CIO

The IT Culture Diagnostic tool assesses various aspects of your department's culture using a series of questions regarding environment, policies, procedures, and behaviors.

Embrace Information Lifecycle Management in Your ECM Program

Blueprint: Data & Business Intelligence

Not all information assets are created equal; you need a structured approach to handling your organization’s information assets from creation to destruction that considers the value and risk associated with each asset. Embrace information lifecycle management in your overall ECM program.

ILM Policy Need Identification Tool

Tool: Data & Business Intelligence

Use this tool to track your ILM policy planning and development as part of the information lifecycle management project.

Information Classification Scheme Creation Tool

Tool: Data & Business Intelligence

Use this tool to create, develop, and refine an information classification scheme that reflects the complexity and security requirements of your information assets.

AI Governance Gap Analysis Tool

Tool: Enterprise Architecture

Determining your strengths and weaknesses in Application Integration (AI) Governance will help you better implement and optimize your AI Governance model. Use this template to see where you fall short so you can properly focus your optimization efforts.

This tool is designed to identify the gaps in your organization's AI Governance practice, and in particular: Roles and responsibilities Policies Processes Technology requirements as they relate to AI Governance.

Information Security Awareness and Training Content Development Tool

Tool: Security

This tool will help to identify content that should be covered by your security awareness and training program.

This tool will allow you the opportunity to map the modules to your current security policies and to any policies that you may not currently have in place.

Right-Size the Governance Model for Your ECM Program

Blueprint: Data & Business Intelligence

ECM success does not come out of the box with an ECM solution. Concerted efforts are required on an ongoing basis to establish, enforce, and improve standards and best practices. Get started with minimum-viable ECM governance and optimize over time through ECM program releases – transforming...

ECM Governance Maturity Assessment

Tool: Data & Business Intelligence

Use this tool to evaluate the maturity of your current ECM governance practices and determine your future-state capabilities.

Support Innovation in Educational Technology

Blueprint: Industry Coverage

Innovation in educational technology has low rates of adoption and can be a waste of scarce funds. A community of practice (CoP) is a useful approach to efficiently using funds to achieve the widest possible adoption rate. In a CoP faculty can pool their professional expertise, share costly...

Community of Practice for Innovation in Educational Technology Template

Tool: Industry Coverage

A best-of-breed template to help you build the policy for the creation of a community of practice for technology innovation in an education institution.

Discover and Classify Your Data

Blueprint: Security

The sensitivity of data varies significantly, from public information to highly confidential trade secrets. To ensure proper protection, businesses need to identify and classify data. However, different classifications of data require different treatment. Protect your sensitive data, but not...

User Data Handling Requirements Tool

Tool: Security

This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.

Assess Your Cybersecurity Insurance Policy

Blueprint: Security

Assess your industry vertical for the most likely threats and risks (i.e. the things the policy must provide coverage for). Perform a business impact analysis to estimate recovery costs and insurance needs. Find the best policy to meet these criteria.

Cyber Insurance Policy Comparison Tool

Tool: Security

This tool will help you to score your prospective insurance policies based on their relative coverage and exclusions.

Make Your IT Governance Adaptable

Blueprint: CIO

To effectively meet the needs and velocity of digital organizations and modern practices, IT governance must be embedded and automated where possible to drive success and value.

Governance Automation Worksheet

Tool: CIO

This worksheet allows you to track key elements of governance decisions and develop the supporting logic and rules that allow for automation.

Return-to-the-Workplace Playbook

Blueprint: McLean & Company

As vaccines roll out and countries pass the peak of the pandemic, organizations are anxious to determine when and how to bring employees back to the workplace.

Return-to-the-Workplace Workbook

Tool: McLean & Company

Use this workbook to document key information and make decisions for the return-to-the-workplace plan.

Implement Your Negotiation Strategy More Effectively

Blueprint: Vendor Management

Preparing to negotiate is only half the battle, and successfully implementing your negotiation strategy requires attention to the subtle nuances of the process. However, not all negotiators are created equal. Effectively addressing and managing ten essential elements of the negotiation process...

During Negotiations Tool

Tool: Vendor Management

This tool will help you manage three key aspects of active negotiations.

Ensure Your Pandemic Response Plan Is Privacy-Proof

Blueprint: Security

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable, and repeatable.

Data Process Mapping Tool Lite

Tool: Security

Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal data that have come out of your pandemic response plan.

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019