To further capabilities in the data privacy space, top-tier vendor OneTrust has acquired Integris, another leading vendor within the data discovery and classification...
|
|
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat...
|
|
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in...
|
|
Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business...
|
|
Assign ownership to ensure the data privacy program is governed in an effective way. Leverage the Data Privacy RACI Chart to support the privacy governance model and ensure...
|
|
Leverage the Data Process Mapping Tool to understand where personal data lives within each of your organization's business processes.
|
|
This phase of the blueprint, 91Ƭ a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...
|
|
This phase of the blueprint, 91Ƭ a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...
|
|
Read this Executive Brief to understand why Info-Tech's approach to Data Privacy is unique and how applying a quantitative lens to an often qualitative subject will help...
|
|
A condensed version of the Data Privacy Framework, this tool emphasizes four key areas of the data privacy framework that can be applied at a more granular, business-unit...
|
|