Demonstrate Data Protection by Design for IT Systems – Phase 2: Plan for IT-System Data Protection by Design Implementation

This phase of the blueprint, Demonstrate Data Protection by Design for IT Systems, will help you demonstrate your adhearance to the DPbD principles in your IT systems.

Data Protection by Design Matrix

Use this matrix to track DPbD best practices across your IT systems, business processes, and application development.

Data Protection by Design IT Systems Record

Use this matrix to record the specific DPbD controls your organization is using to ensure data privacy across IT systems.

Darktrace Masters the Art of Storytelling With Cyber AI Analyst

Darktrace introduced a “Cyber AI Analyst” in September 2019 as a means of offloading incident management responsibilities from InfoSec practitioners. This new feature...

Develop a Security Awareness and Training Program That Empowers End Users

Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
  • guided implementation icon

Develop a Security Awareness and Training Program That Empowers End Users – Executive Brief

Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you build a development plan for your program, as well...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end...

Security Awareness and Training Program Development Tool

This tool will help you identify initiatives to develop your security awareness and training program. The tool focuses on four areas of initiatives: the fundamentals,...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us