Get Instant Access
to This Blueprint

Cio icon

Take Control of Compliance Improvement to Conquer Every Audit

Don’t gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.

  • Most enterprises view compliance as a "must-do" expense rather than a "should-do," value-added activity.
  • IT is often left out of compliance discussions and is unaware of compliance requirements or non-compliance gaps.
  • Organizations generally wait to improve compliance until mandated changes are dictated following an adverse audit or assessment.

Our Advice

Critical Insight

  • Don’t gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.
  • Take an agile approach to analyze your gaps and prioritize your remediations. You don’t always have to be fully compliant as long as your organization understands and can live with the consequences.

Impact and Result

Approach compliance proactively and derive value from the process by managing your compliance initiatives using a constant cycle.

  • You need to initiate the drive to conform with regulations and improve compliance.
  • You need to consistently assess the regulatory and business landscape to determine your compliance gaps.
  • You need to improve compliance and remediate non-compliance in an effective, tactical manner.
  • You need to confirm and assure compliance through regular adherence checks.

Info-Tech’s framework presented in this blueprint is compliant with COBIT MEA03 – Monitor, Evaluate, and Assess Compliance with External Compliance.


Take Control of Compliance Improvement to Conquer Every Audit Research & Tools

1. Launch the project

Make the case and launch the compliance project.

2. Perform a gap analysis

Identify compliance requirements and prioritize non-compliance gaps.

3. Remediate non-compliance gaps

Improve non-compliance and document management gaps.

4. Confirm compliance

Assure and confirm compliance through interviews and audits.


External Compliance

Don't gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.
This course makes up part of the Security & Risk Certificate.

Now Playing:
Academy: External Compliance | Executive Brief

An active membership is required to access Info-Tech Academy
  • Course Modules: 5
  • Estimated Completion Time: 2-2.5 hours
  • Featured Analysts:
  • David Yackness, Sr. Research Director, CIO Practice
  • James Alexander, SVP of Research and Advisory, CIO Practice
Take Control of Compliance Improvement to Conquer Every Audit preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 4-phase advisory process. You'll receive 9 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Launch
  • Call 1: Make the case
  • Call 2: Launch the project

Guided Implementation 2: Gap Analysis
  • Call 1: Identify regulatory requirements
  • Call 2: Conduct gap analysis
  • Call 3: Prioritize gaps

Guided Implementation 3: Remediation
  • Call 1: Develop remediations
  • Call 2: Improve evidentiary document management

Guided Implementation 4: Confirmation
  • Call 1: Confirm compliance
  • Call 2: Introduction to audit

Authors

Josh Mendelssohn

Dana Tessler

Contributors

  • Heriot Prentice, Director of Technology Operations Review, Brown & Brown
  • Glen Notman, Associate Partner, Citihub
  • Tony Noblett, SVP CISO, Urban Lending Solutions
  • Carter Cameron-Huff, Consultant, Enterprise Risk Services, MNP LLP
  • Ashley Moore, Policy & Planning Program Director, Broadcasting Board of Governors
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019