This tool will help you determine your security program goals and develop a key performance indicators to measure your progress on those goals.
|
|
A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...
|
|
Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and...
|
|
Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.
|
|
Use this tool in phase 1 of the Responsibly Resume IT Operations in the Office research to evaluate and better understand the organization's post-pandemic risk tolerance.
|
|
The Mid-Pandemic IT Prioritization Tool simplifies the long to-do list of transition tasks for your IT and InfoSec team to carry out. Identify, classify, and prioritize...
|
|
This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...
|
|
Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...
|
|
The In-House vs. Outsourcing Decision-Making Tool is designed to help organizations analyze the cost and risk management effectiveness for security capabilities with...
|
|
Assign responsibilities for the security operations process.
|
|