GDPR Initiative Prioritization Tool

To enable effective execution of compliance, GDPR initiatives should be evaluated and prioritized.

Fast Track Your GDPR Compliance Efforts – Phase 3: Satisfy Documentation Requirements

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, will help you satisfy a core regulatory requirement: a record of processing.

Record of Processing Template

As a data controller or processor, align your required record of processing requirements to your activities.

Fast Track Your GDPR Compliance Efforts – Phase 4: Align Your Data Breach Requirements & Security Program

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, will aid in aligning privacy and information security.

Fast Track Your GDPR Compliance Efforts – Phase 5: Prioritize Your GDPR Initiatives

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, highlights the next regulatory steps and helps prioritize all your compliance projects.

Legitimate Interest Assessment Template

Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon

Identify Opportunities to Mature the Security Architecture – Executive Brief

Discover why every organization needs an appropriate security architecture. Review how this blueprint will assist with the development of a right-sized security...

Identify Opportunities to Mature the Security Architecture – Phases 1-2

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech's approach to evaluating the...

Identify Opportunities to Mature the Security Architecture – Phase 1: Identify the Organization's Ideal Security Architecture

Complete multiple assessments to determine how mature the security architecture should be for your organization. These assessments will look at IT complexity, security...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us