A best-of-breed template to help you document roles and responsibilities related to identity security.
|
|
A step-by-step document that walks you through how to properly inventory your identity types, repositories, threats, and mitigations.
|
|
Security leaders view modernizing identity security as too daunting and prefer to focus on narrower technology challenges. This limited focus is reactive and, in the long...
|
|
This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...
|
|
This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...
|
|
This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible...
|
|
Use this template to help you formalize your process for cross-border data transfer.
|
|
To enable effective execution of compliance to the GDPR, a Data Protection Impact Assessment should be completed for processing activities that put data subjects at risk.
|
|
Use this template to formalize and document your data controller and processor obligations.
|
|
Use this template to help you formalize your data protection impact assessment (DPIA) process.
|
|