Tagged - compliance

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.

Build an Information Security Strategy for Small Enterprises

Build a business-aligned, risk-aware, holistic security strategy that is suited for your small enterprise: gather business requirements to prioritize improvements; assess...
  • guided implementation icon

Build an Information Security Strategy

Build a business-aligned, risk-aware, holistic security strategy: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and...
  • guided implementation icon

Vendor Management Governance: Forming the Vendor Management Initiative

As with all business practices, organizations should define how the vendor practice should operate in their respective culture. Organizations setting expectations for...

The Duty of Due Diligence: Examining your vendors could prevent disaster

Due diligence grants us a glimpse into the potential risks of entering vendor relationships. More importantly, performing due diligence allows us to continually reassess...

Build an Information Security Strategy for K-12 Schools

Many K-12 schools and districts do not have sufficient resources to adequately address information security needs. Having a well-defined information security plan that is...
  • guided implementation icon

Build an Information Security Strategy for K-12 Schools – Phases 1-4

Use this storyboard to augment your security strategy by ensuring alignment with business objectives, assessing your organization's risk and stakeholder expectations,...

Information Security Requirements Gathering Tool for K-12

Use this tool to identify goals and compliance obligations and make explicit links to how security initiatives propose to support these interests. Then define the scope...

Information Security Strategy Communication Deck for K-12

Use this communication deck template to present the results of the security strategy to stakeholders, demonstrate the progression from the current state to the future...

Privacy Framework Tool

The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us