Use this tool to determine which employees should be selected for layoff and in which order of priority.
|
|
Use this tool to help define and track a due diligence workflow for managing cybersecurity during an M&A.
|
|
The Information Security Program Gap Analysis Tool will help you systematically understand your current security state.
|
|
This tool helps an organization identify the major benefits and drivers for adopting a zero trust security strategy.
|
|
This tool will help you to score your prospective insurance policies based on their relative coverage and exclusions.
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Business Satisfaction Report Tool to compare your results against your peers.
|
|
A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...
|
|
Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and...
|
|
Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.
|
|