Tagged - compliance

Data Governance Planning and Roadmapping Workbook

Use the Data Governance Planning and Roadmapping Workbook to assist with establishing effective data governance practices.

Data Use Case Framework Template

This template takes you through a business needs gathering activity to highlight and create relevant use cases around the organization’s data-related problems and...

Establish Data Governance – Phases 1-3

Building a data governance engine is a critical first step to enable data-driven knowledge and insight. Use this research to help you create a sustainable and effective...

Business Data Catalog

Use the Business Data Catalog to manage the business terms, their definitions, and other important details including ownership, systems, and how the data should be used...

Cloud Security Architecture Reference Model

Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.

Cloud Security Architecture Archive Document

This template, part of the Identify the Components of Your Cloud Security Architecture blueprint, will serve as a repository of information about your approach to...

Cloud Security Architecture Communication Deck

Socialize your findings to executive stakeholders and decision makers with a customizable, prepopulated communication deck. Explain the risks and the security services...

Identify the Components of Your Cloud Security Architecture – Phase 4: Cloud Security Strategy Planning

This part of the blueprint Identify the Components of Your Cloud Security Architecture explores additional considerations when moving to the cloud – in particular, the...

Identify the Components of Your Cloud Security Architecture – Executive Brief

Read our concise Executive Brief to find out why you should identify the components of your cloud security architecture, review Info-Tech’s methodology, and understand...

Identify the Components of Your Cloud Security Architecture

Info-Tech has developed an approach to cloud security that is built on the strong foundations of our security strategy model that has been successfully implemented across...
  • guided implementation icon
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us