privacy

Conduct an AI Privacy Risk Assessment

Blueprint: Security

Design an AI implementation that is guided by data governance and data privacy best practices. Effective AI implementation is built on a foundation of effective data privacy principles and awareness.

AI Privacy Impact Assessment Tool

Tool: Security

Leverage PIAs to empower your AI technology by integrating protection and management of personal data at scale.

Sample AI PIA for Microsoft Copilot

Tool: Security

Introduce Gen AI across Microsoft business applications.

Comply With 2023 US Privacy Laws (Virginia, Connecticut, Utah, Colorado)

Blueprint: Security

Organizations need to employ a systematic approach in establishing and operationalizing risk-based and right-sized privacy programs.

Privacy Framework Tool

Tool: Security

The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to move towards a mature data privacy program.

US Privacy Law Scope and Readiness Assessment Tool

Tool: Security

This tool provides you with a checklist to start assessing the applicability and privacy compliance readiness level for the following privacy and data protection laws and regulations enacted by Virginia, Connecticut, Utah, and Colorado.

Build a Data Privacy Program

Blueprint: Security

Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business efficiency.

Data Privacy Program RACI Chart

Tool: Security

Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and ensure that privacy permeates the entire organization.

Privacy Analysis by Business Unit Tool

Tool: Security

A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit level.

Data Process Mapping Tool

Tool: Security

Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.

Ensure Your Pandemic Response Plan Is Privacy-Proof

Blueprint: Security

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable, and repeatable.

Data Process Mapping Tool Lite

Tool: Security

Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal data that have come out of your pandemic response plan.

Embed Privacy and Security Culture Within Your Organization

Blueprint: Security

A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization. But building a privacy and security culture extends beyond projects, controls, and metrics, and it...

Privacy and Security Business Alignment Tool

Tool: Security

The Privacy and Security Business Alignment Tool is your repository for tracking the alignment of your business objectives, privacy and security enablers, and associated metrics.

Demonstrate Data Protection by Design for IT Systems

Blueprint: Security

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see hard evidence. Thus, companies need to be able to demonstrate how they are securing client data.

Data Protection by Design Matrix

Tool: Security

Use this matrix to track DPbD best practices across your IT systems, business processes, and application development.

Data Protection by Design IT Systems Record

Tool: Security

Use this matrix to record the specific DPbD controls your organization is using to ensure data privacy across IT systems.

Achieve Digital Resilience by Managing Digital Risk

Blueprint: Security

In a world dominated by rapid digital development, every risk is a digital risk. As a result, risk no longer exists in isolation in the IT or audit department of a business. Digital risk exists at a true crossroads of enterprise, IT, and cyber risk. Organizations should draw on elements from...

Digital Risk Profile Tool

Tool: Security

Use this tool to identify which risk categories are of primary concern to your organization based on your internal and external environment, as well as set of predefined risk factor controls spanning the five categories of digital risk.

Mature Your Privacy Operations

Blueprint: Security

This blueprint will help you to operationalize your privacy program by guiding you through processes related to determining your current state, drafting documentation, assessing risks, managing sensitive data, and developing metrics.

Privacy Metrics Determination and Tracking Tool

Tool: Security

This tool will help you determine your privacy program goals and develop KPIs to measure your progress on those goals.

Privacy Readiness Assessment Tool

Tool: Security

Use this tool to determine your privacy program's maturity and to identify any initiatives needed to close gaps and boost maturity in assessed areas.

Secure Your High-Risk Data

Blueprint: Security

What’s the key to a data security plan that keeps breaches at bay? A multi-layered approach that covers all the bases and data sources. Comprehensive security that’s as fluid as the data it protects.

Data Security Matrix

Tool: Security

Break down, assess, compare compliance frameworks, and identify gaps in the organization's data security landscape using the Data Security Matrix tool.

Address Security and Privacy Risks for Generative AI

Blueprint: Security

This research will help security leaders seeking to better understand the risks associated with using generative AI and will walk them through how to manage those risk in the short and long term.

AI Security Policy Template

Tool: Security

Use this policy template as the basis of your AI security policy.

Generative AI Risk Map

Tool: Security

Use this tool to determine your data-security risks and recommended policy statements for using generative AI.

The First 100 Days As CIO

Blueprint: Team Leadership & Management

You’ve been promoted from within or hired externally to the role of CIO. Studies show that two years after a new executive transition, as many as half are regarded as failures or disappointments (McKinsey). First impressions are hard to overcome, and a CIO’s first 100 days are heavily weighted...

Organizational Catalog

Tool: Team Leadership & Management

Use this catalog to record critical data points about your key stakeholders and to manage their interests and expectations of the IT organization.

Fast Track Your GDPR Compliance Efforts

Blueprint: Security

The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future revenue. There is no one-size-fits-all methodology. The scope of GDPR projects depends on the nature of applicability for your...

GDPR RACI Chart

Tool: Security

Assign responsibilities and deadlines for the GDPR compliance process.

Embrace Information Lifecycle Management in Your ECM Program

Blueprint: Data & Business Intelligence

Not all information assets are created equal; you need a structured approach to handling your organization’s information assets from creation to destruction that considers the value and risk associated with each asset. Embrace information lifecycle management in your overall ECM program.

Information Classification Scheme Creation Tool

Tool: Data & Business Intelligence

Use this tool to create, develop, and refine an information classification scheme that reflects the complexity and security requirements of your information assets.

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019