91ÖÆÆ¬³§

Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Security icon

Discover and Classify Your Data

Provide your data with the protection it deserves.

Many organizations struggle to keep ahead of today’s overwhelming flood of data, resulting in limited value at best, and unmitigated risks at worst. Our research offers strategic and structured guidance on discovering your data and building a classification system that unlocks its value as a powerful decision-making tool while protecting sensitive information and meeting regulatory requirements.

Data backlogs, inadequate data handling procedures, ad hoc classification programs, end-user issues and other technical challenges stand in the way of organizations understanding what data they have. By starting with small, incremental steps and prioritizing the most critical data in collaboration with data owners, data leaders can get a handle on their data inventory, improve accessibility and storage, and maximize data’s value to the organization.

1. You don’t have to do it all at once.

Depending on the size of your data backlog, classifying all your data may not be feasible at the outset. ¶Ù´Ç²Ô’t be afraid to start small, prioritizing and classifying a manageable portion of data, quantifying the results, and reporting them back to management. Then, take the next step of tackling a bigger portion.

2. Keep it simple.

For a data classification system to be robust and useful, it must be as simple as possible, allowing for very little ambiguity. That simplicity must extend to everyone who handles the data, from custodians to end users, all of whose roles and responsibilities must be clearly defined.

3. Classification is an ongoing process.

Data does not stay static – effective classification must be seen as a process, not a one-time project. This will be especially useful in the realm of risk mitigation, as knowing what data you have and where it lives will help assess its criticality, leading to more accurate threat modelling and security controls investments.

Use this blueprint to start discovering and classifying your data

Our research offers multiphase guidance and a comprehensive array of templates, workbooks, and other tools to formalize and structure your data classification efforts. Use this step-by-step approach to discover the data that matters and build a measurable, auditable, and manageable classification program that protects what you have and allows you to leverage it for maximum organizational benefit.

  • Formalize your classification program by developing classification and policies and standards, establishing a steering committee charter, and assigning roles and responsibilities.
  • Implement your data discovery plan to understand what you have, including interviewing data owners and assessing vendor solutions for technology-assisted discovery.

  • Classify your data by analyzing what ²â´Ç³Ü’v±ð found, identifying technical solutions to classification, and laying the groundwork for maintaining and optimizing your classification program going forward, including establishing key metrics and improving end-user awareness and training.

Discover and Classify Your Data 91ÖÆÆ¬³§ & Tools

1. Start with our Discover and Classify Your Data deck.

Use this deck to understand the benefits and opportunities of data classification, anticipate the challenges and obstacles most organizations face, and leverage Info-Tech’s step-by-step methodology to begin your data classification journey.

2. Develop a classification program.

Use these tools and templates to understand the value of data classification and build the outline of your classification program.

3. Discover the data.

Use these detailed tracking and verification tools to comprehensively discover the data you have and consider how to incorporate human- and technology-based tools to simplify the discovery process.

4. Classify the data.

Use these tools to implement the classification program in a way that ensures an appropriate level of protection.

5. Communicate your data classification plan.

Use these customizable awareness materials and comprehensive communication deck to set out and clearly communicate your data classification plan to stakeholders and decision-makers to build support.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

9.4/10


Overall Impact

$134,822


Average $ Saved

48


Average Days Saved

Client

Experience

Impact

$ Saved

Days Saved

Bristol Bay Native Corporation

Guided Implementation

9/10

$10,880

5

Platinum Equity Advisors LLC

Guided Implementation

10/10

N/A

N/A

Best part was I was able to focus on the documentation I created and receive feedback and advise.

Plastipak Holdings

Guided Implementation

9/10

$68,000

90

worst: had formula issues with one of the tools best: our analyst, Petar - he was responsive, active in finding resolutions, and all-around very ... Read More

Ministry of Industry, Innovation, Science and Technology

Guided Implementation

9/10

$13,600

32

Louisville Water Company

Workshop

9/10

N/A

120

The highlight of the experience was the extensive amount of data collected, along with Safayat's valuable context explaining the purpose of the wor... Read More

Black & McDonald Limited

Guided Implementation

8/10

$10,000

6

Good high level overview of approach/offering. Difficult to estimate any savings at this point.

County of Stafford

Workshop

9/10

$100K

110

The RACI tool efforts were very time-consuming but necessary. Otherwise, it was a great experience.

City of Winter Park

Guided Implementation

9/10

N/A

5

Safayat is very knowledgeable. He seems to have a complete grasp of the subject matter. It was very easy to interact with him.

Flight Centre Australia

Guided Implementation

9/10

$13,700

10

Excellent engagement, validation our approach and gave us strong steer with regard to next steps, no bad aspects of the engagement

Goodwill Industries of Middle Tennessee, Inc.

Guided Implementation

10/10

$13,700

10

Mainstreet

Guided Implementation

10/10

$10,000

50

Safayat and Greg are patient and take the time to understand our requirements.

Kentucky Cabinet for Health and Family Services

Workshop

10/10

N/A

50

The ITRG team worked diligently with us before the workshop to better understand our priorities, and Erik did a great job tailoring the workshop co... Read More

PA Public Utility Commission

Workshop

10/10

$1.37M

120

As a regulatory agency, there are significant fines and consequences such as prison that result from improperly dealing with CSI (Confidential Secu... Read More

Community Living Toronto

Guided Implementation

10/10

$10,000

32

safayet was amazing and very thorough. please keep up the great work.

City of Santa Fe

Workshop

10/10

$68,500

50

The facilitation was great, and the material aligned to what we needed to meet the City's objectives.

United Nations International Computing Centre

Guided Implementation

10/10

N/A

N/A

Professionalism, flexibility and availability of the expert.

Commonwealth of Virginia - Office of the Attorney General

Guided Implementation

10/10

$2,603

20

Alan was very helpful and accommodating to our needs.

Ministry of Industry, Innovation, Science and Technology

Guided Implementation

8/10

$61,706

50

Central Bank of Barbados

Guided Implementation

10/10

N/A

N/A

Anu has a cheerful disposition paired with knowledge and experience. Thanks to her, we were able to advance our data discovery efforts for nine (9... Read More

Noble 91ÖÆÆ¬³§ Institute, LLC

Guided Implementation

8/10

$2,519

5

Goodwill Industries of South Florida

Guided Implementation

10/10

N/A

10

Central Bank of Barbados

Workshop

9/10

$47,500

50

The best part was that Reddy’s expertise in this area was excellence guidance for us. He was able to not only describe the best practice approach t... Read More

Lawyers’ Professional Indemnity Company

Workshop

9/10

$16,000

90

Best part is in just 4 days we were able to achieve months worth of work.

Sterilite Corporation

Workshop

9/10

$31,499

50

Interdigital Communications

Guided Implementation

9/10

$27,719

10

City Of Issaquah

Guided Implementation

10/10

$29,609

120

Logan has been a great mentor! always on time and ready to help!

Forrester Construction

Guided Implementation

10/10

$5,039

3

Best part was that Alan was very knowledgeable and accommodating throughout the experience. He provided additional internal and external resources... Read More

American Transmission Company

Guided Implementation

10/10

N/A

N/A

This project wasn't about saving time or money, but was about defining a framework to consistently assess cyber threats and appropriate system secu... Read More

Deltec Bank & Trust Limited

Workshop

9/10

$69,299

120

The entire workshop experience was awesome. Reddy, years of experience were needed and appreciated to get through this workshop.

Kleinfelder Group

Workshop

10/10

$30,999

10

I don't have any negative feedback to provide. Cassandra was very supportive and accommodating in helping us move our data security program forwar... Read More


Workshop: Discover and Classify Your Data

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

Module 1: Formalize the classification program

The Purpose

  • Establish a structured and governance-driven approach to data classification by defining policies, standards, and responsibilities.

Key Benefits Achieved

  • Gain a formalized data classification program with clear policies, governance, and compliance alignment. Laying the foundation for scalable and effective data classification, to ensure information is properly managed and secured.

Activities

Outputs

1.1

Develop a steering committee charter to provide oversight and leadership.

  • A structured governance body to guide decision-making and ensure accountability.
1.2

Identify relevant regulations to align classification policies with legal and industry standards.

  • A compliance-driven classification framework that reduces regulatory risks and enhances audit readiness.
1.3

Create a data classification policy to define how data is categorized and managed.

  • Formalized definitions and requirements for operationalizing a data classification program.
1.4

Assign roles and responsibilities to stakeholders involved in classification efforts.

  • Clearly defined RACI chart, ensuring effective enforcement and ongoing management of classification initiatives.
1.5

Develop a classification standard with handling requirements across classification levels.

  • Consistent guidelines for data access, storage, retention, and protection, minimizing risks of misclassification or unauthorized access.

Module 2: Discover the data

The Purpose

  • Develop a structured approach to data discovery by leveraging both technology and stakeholder insights.

Key Benefits Achieved

  • Create a clear methodology for discovering and understanding the organization's data assets. This ensures that future classification efforts are accurate, efficient, and aligned with business needs.

Activities

Outputs

2.1

Consider data governance and DLP solutions for automated and technology-assisted data discovery.

  • Clear understanding of key attributes to evaluate when selecting a tool, ensuring the right fit for the organization’s needs.
2.2

Conduct interviews with data owners to gather business context and validate technical findings.

  • A systematic approach for conducting data discovery interviews, ensuring alignment between business and IT perspectives.

Module 3: Classify the data

The Purpose

  • Classify data based on sensitivity, regulatory requirements, and business value while ensuring accuracy and consistency in classification levels.

Key Benefits Achieved

  • Obtain insights from classified data to enable better risk mitigation, data management, and policy enforcement across the enterprise.

Activities

Outputs

3.1

Assign classification labels according to predefined policies and sensitivity levels.

  • A centralized and organized data inventory, ensuring that data is categorized consistently across the organization.
3.2

Use classification insights to streamline storage, retention, and archiving strategies.

  • Improve efficiency by potentially eliminating redundant or obsolete data, while prioritizing protection for high-value assets.

Module 4: Plan to implement the program

The Purpose

  • Operationalize and sustain the data classification program through ongoing measurement, user adoption, and continuous improvement.

Key Benefits Achieved

  • Proactively ensure long-term sustainability, compliance, and effectiveness of the data classification program.

Activities

Outputs

4.1

Prioritize and track meaningful metrics using the Data Classification Metrics Tracking Tool.

  • A list of key performance indicators (KPIs) to measure classification success, compliance adherence, and security improvements
4.2

Develop a plan for end-user awareness and training to ensure employees understand classification policies and responsibilities

  • Improved user engagement and accountability, reducing misclassification risks and strengthening compliance.
4.3

Communicate program status and updates to leadership and key stakeholders through structured reporting.

  • A customized program communication deck, fostering executive buy-in, cross-functional collaboration, and accountability.

Discover and Classify Your Data

Provide your data with the protection it deserves.

Analyst Perspective

Keep data classification simple.

Data classification is crucial for organizations to protect sensitive information, comply with regulatory requirements, and enhance operational efficiency. It supports better data governance, enabling organizations to optimize storage, improve data accessibility, and enhance decision-making processes.

However, organizations are overwhelmed with data and securing it is a growing challenge. Business and IT leaders can ensure that critical data is protected without wasting resources by keeping data classification simple. Focus on:

  • Taking incremental steps; don't try to classify everything immediately.
  • Identifying and securing the most critical, high-sensitivity data first.
  • Collaborating with data owners to help prioritize key assets.

To streamline the process, integrate data classification into daily workflows, allowing users to label information as they create it. This approach reduces the burden on employees while improving compliance and governance over time. Understanding where critical data resides and how it is protected enables organizations to justify security investments and enhance overall data protection and governance strategies.

Logan Rohde, Cybersecurity Advisor

Logan Rohde
Cybersecurity Advisor
Security and Privacy
91ÖÆÆ¬³§

Safayat Moahamad, 91ÖÆÆ¬³§ Director

Safayat Moahamad
91ÖÆÆ¬³§ Director
Security and Privacy
91ÖÆÆ¬³§

Executive Summary

Your Challenge Common Obstacles Info-Tech's Approach
  • You have compliance requirements to identify and classify, and you need to protect high-risk data.
  • Existing data handling procedures don't properly address the sensitivity of your data.
  • Your data classification program is ad hoc or dated, and you don't apply the scheme consistently.
  • You need to purchase software to support your data classification program.
  • You have a large data backlog and don't know where to start the classification project.
  • You have a limited budget. You need to understand where the most protection against data breaches is required so you can save on storage costs.
  • End users are the weakest link in the data security chain. They need significant awareness and training to accurately classify sensitive information.
  • Formalize the data classification initiative with policies, standards, and a structured steering committee to ensure accountability and consistency.
  • Identify where your data lives and implement controls to protect it. Ensure the protection is proportional to its sensitivity and criticality.
  • Understand what tools are available to implement an efficient data classification program.

Info-Tech Insight

Avoid analysis paralysis. Classifying all your data at once may not be feasible. Start small, quantify your results, report them to management, and then go back and tackle a larger portion.

Your Challenge

This research is designed to help organizations design a process to discover and classify their data.

  • Data classification is the process of organizing data into relevant categories. Classification helps improve information security and privacy by enabling the assignment of access permissions and the implementation of protection measures for different kinds of data.
  • Without a consistent process to discover and classify sensitive or critical data, you won't be able to identify what data is at high risk of being leaked or stolen. Prioritize risk mitigation initiatives to prevent a data breach or determine how to scale investment in data loss prevention tools.

Data discovery and classification is the first step in protecting high-risk data from malicious actors.

Average Cost of a Data Breach

Average data breach costs rose from $3.86 million, in 2020, to $4.88 million in 2024. It is the highest average total cost in the history of this report. Costs were significantly lower for organizations with a more mature security posture.

Source: IBM, 2024

Common Obstacles

Data discovery can be daunting. Avoid analysis paralysis.

  • Large data backlogs can make it difficult to figure out where to start. Classifying all your data at once may not be feasible.
  • You have a limited budget. You need to understand where you need the most protection against data breaches so you can save on storage costs.
  • The dynamic nature of data complicates matters. The criticality of a piece of data shifts over time. Your data classification program will need to incorporate reassessments to prevent overprotecting the data.

You can't secure high-risk data that you haven't identified. Focus the program to classify what matters. The classification program should be measurable, auditable, and manageable.

Data tagging

Over three out of ten respondents at companies that did not perform data mapping or inventory, data retention, data tagging, or training and awareness reported they were not at all confident about compliance.

Source: IAPP, 2024

Discover and Classify Your Data

Insight summary

Provide your data with the protection it deserves.

Avoid analysis paralysis.

  • Classifying all your data at once may not be feasible. Start small, quantify your results, report them to management, and then go back and tackle a larger portion.

Keep it simple.

  • Leave as little ambiguity as possible for an easy-to-follow classification program. Clearly define the roles and responsibilities of everyone involved, from data custodians to data users.

Data, by its nature, does not stay static.

  • A piece of data's criticality will peak, but strategic reassessment will eliminate under/overprotection of data. Data classification must be a program, not a one-time project.
  • Successful risk mitigation is dependent on knowing your data's criticality and where it lives. While data discovery can be overwhelming, strategic interviews with data owners, in addition to the use of technology, are starting steps to mapping data.
  • This information leads to more accurate threat modeling and security controls investments.

Focus the program on measurable, auditable, and manageable classification.

  • Perform data location analysis and security analysis to inform your overall security initiatives. Understand which departments own the most sensitive data and provide training to improve awareness.
  • Use the classification distribution visuals to make strategic decisions such as which security controls and processes your organization should expand and which repositories it should consolidate.

Blueprint deliverables

Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

Steering Committee Charter
Classification Policy
Classification Standard
Data Classification RACI
User Data Handling Requirements

Develop a classification program.

Data Discovery Interview Tracking

Incorporate human and technology-based tools to simplify discovery.

Inventory Tool
Verification Tool
Metrics Tracking Tool
Awareness Pamphlet
Awareness Poster

Implement the classification program to ensure appropriate levels of protection.

Key deliverable:

Data Classification Inventory Tool

Use this tool to define your classification scheme, track and consolidate the classification of corporate assets, and gain visibility into the location and security of your organization's most sensitive data.

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit Guided Implementation Workshop Executive & Technical Counseling Consulting
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team and processes are maturing; however, to expedite the journey we'll need a seasoned practitioner to coach and validate approaches, deliverables, and opportunities." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

Diagnostics and consistent frameworks are used throughout all five options.

Guided Implementation

What does a typical GI on this topic look like?

Phase 1 Phase 2 Phase 3

Call #1: Establish a data classification steering committee.

Call #2: Formalize data classification documentation.

Call #3: Plan data discovery.

Call #4: Implement data discovery.

Call #5: Classify the data.

Call #6: Maintain and optimize the program.

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement the project.

A typical GI for this project is four to six calls over the course of four to six months.

Workshop Overview

Day 1 Day 2 Day 3 Day 4 Day 5
Activities Formalize the Classification Program Discover the Data Classify the Data Implement the Program Next Steps and Wrap-Up (Offsite)

1.1 Understand the benefits of data classification

1.2 Discuss legal, contractual, and regulatory obligations

1.3 Develop a data classification steering committee

1.4 Determine the data classification scheme

1.5 Develop the data classification policy

1.6 Develop the data classification standard

1.7 Define the data classification RACI

2.1 Discuss benefits and challenges of data discovery

2.2 Discuss technology options for discovery and classification

2.3 Discuss the human-based approach to data discovery

2.4 Define discovery interview questions

2.5 Conduct data discovery interviews (approximately two interviews)

3.1 Continue conducting interviews (approximately two interviews) and aggregate preliminary results

3.2 Classify preliminary findings uncovered from interviews

3.3 Understand the results of the Data Classification Inventory Tool

3.4 Discuss next steps for optimizing the process

4.1 Identify data metrics to track and report

4.2 Develop awareness and training material

4.3 Discuss next steps for continuing the data classification initiative

4.4 Debrief

5.1 Complete in-progress deliverables from previous four days

5.2 Set up time to review workshop deliverables and discuss next steps

Deliverables
  1. Data Classification Steering Committee Charter
  2. Data Classification Policy
  3. User Data Handling Requirements Tool
  4. Data Classification Standard
  5. Data Classification RACI Tool
  1. Data Discovery Interview Tracking Tool
  2. Approximately two completed interviews
  1. Approximately two completed interviews
  2. Data Classification Inventory Tool
  3. Data Classification Verification Tool
  1. Data Classification Metrics Tracking Tool
  2. 1
  3. Data classification awareness and training material

Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889

Measure the value of this blueprint

Phase Purpose Measured Value
Define Requirements Understand classification requirements and formalize documentation.

Time, value, and resources saved, with guidance and templates:

3 FTEs*3 days*$80,000/year=$2,880

Discover and Classify Your Data Perform data discovery. Expect to save 10% to 30% from discovery efforts with guidance.
Size of organization Small Mid-sized Large
Phase duration 45 days 7 days 180 days discovery
Savings $1,440-$4,320 $2,400-$7,200 $5,700-$17,280
Implement Program Perform data classification and analysis. Expect to save 10% to 30% from classification efforts with guidance.
Size of organization Small Mid-sized Large
Phase duration 180 days 180 days 360 days
Savings $5,760-$17,280 $5,760-$17,280 $11,520-$34,560

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Overall Impact

9.5 / 10

Overall Average Savings

$166,020

Overall Average Days Saved

49

Phase 1

Formalize the Classification Program

Phase 1

1.1 Establish a steering committee
1.2 Formalize data classification policy

Phase 2

2.1 Plan data discovery efforts
2.2 Implement data discovery plan

Phase 3

3.1 Classify the data
3.2 Maintain and optimize the program

This phase will walk you through the following activities:

  • Develop a steering committee charter
  • Create a data classification policy
  • Develop a data classification standard
  • Assign roles and responsibilities in the data classification program

This phase involves the following participants:

  • Security leader
  • Data steward
  • Data custodian
  • Data owners
  • Legal representative
  • Data user representative

Outcomes of this step

  • Identify compliance regulations
  • 91ÖÆÆ¬³§ steering committee
  • Define roles and responsibilities
  • Formalize requirements and definitions
  • Documented data handling requirements and procedures

Step 1.1

Establish a steering committee

Agenda

Review the core governance structure.
Develop a data classification steering committee.
Develop a data classification steering committee charter.

This step will walk you through the following activities:

  • Assemble the data classification steering committee
  • Formalize the steering committee charter

This step involves the following participants:

  • Security leader
  • Data steward
  • Data custodian
  • Data owners
  • Legal representative
  • Data user representative

Outcomes of this step

  • A data classification steering committee to serve as the foundational governance structure that is supported by a charter, capturing the objectives and mode of operations for the program.

Formalize the Classification Program

Activity 1.1 > Activity 1.2

Review the core governance structure

Organizations need to identify roles and responsibilities at strategic, tactical, and operational levels; establish a data classification steering committee; and identify all stakeholders that will support the program. Maturity, organization size, and enterprise governance structure will influence the program governance structure.

Review the core governance structure

Develop a data classification steering committee

Purpose

The data classification steering committee (DCSC) will ensure that project goals are on target for timely completion by overseeing:

  • The data discovery and classification process plus the classification of data stores.
  • The creation, destruction, and storage of information in any medium.
  • Information systems associated with the organization.

Goals

  • Ensure that all involved personnel understand the discovery and classification protocol and why these processes have been initiated.
  • Provide strategic leadership for the classification initiative to align with corporate objectives.
  • Resolve unanticipated issues that arise during the discovery/classification of data by establishing a consensus on how best to proceed.
  • Establish open communication between data users and owners and all other roles.

Establish a steering committee to bridge the gap between data classification business requirements and technical capabilities.

Establish an effective data classification steering committee

Establishing an Effective DCSC

Develop an agenda and clearly identify activities, adhering to time allotments.

Define job descriptions for each DCSC member to outline their respective duties and responsibilities to encourage accountability.

Set quorum at 50% of DCSC members so that operations can continue without full attendance but not without a majority.

Seek diverse points of view but limit the overall number of committee members to avoid unnecessary competition.

Avoid half-day or all-day meetings; they are unproductive and often lead to frustration. Meetings should last no longer than 90 minutes.

Activity 1.1.1

Formalize the steering committee charter

The data classification steering committee (DCSC) charter defines the role of the DCSC and outlines the goals, scope, and purpose of the data discovery/classification effort. It highlights specifics such as membership, mandate, and meeting agenda.

  1. To ensure the template reflects the goals and requirements of your organization's data classification effort, simply replace or remove the grey text in the document.?
  2. Evaluate the usefulness of the tips sections for your organization and deploy them as you see fit.?
  3. Use the Appendix to define Pre-Work, First Meeting, and Second Meeting Agenda items.

Download the Data Classification Steering Committee Charter template

Input Output
  • Membership of committee
  • Operational details
  • A data classification steering committee charter customized for your organization
Materials Participants
  • Charter template
  • Security leader
  • Data steward
  • Data custodian
  • Data owners
  • Legal representative
  • Data user representative

Step 1.2

Formalize data classification policy

Agenda

Determine your data classification scheme.
Develop the data classification policy.
Develop the data classification standard.
Define the data classification RACI.

This step will walk you through the following activities:

  • Formalize the policy with your classification scheme
  • Formalize the standard, including data handling requirements and necessary disclaimers
  • Assign roles in the RACI chart

This step involves the following participants:

  • Security leader
  • Data steward
  • Data custodian
  • Data owners
  • Legal representative
  • Data user representative

Outcomes of this step

A policy that details the roles and responsibilities needed to execute a successful program as well as a clear and concise classification standard that can be promptly implemented in your organization.

Formalize the Classification Program

Activity 1.1. > Activity 1.2

Determine your classification scheme

Stakeholders will find simple and intuitive classification schemes easier to use.

  • Data is classified based on a hierarchy of sensitivity.
  • This hierarchy typically has three to five tiers, depending on the impact of the data being exposed or compromised.
  • On the next few slides, there is a variety of potential classifications. Discuss those that apply to your organization.

Provide your data with the protection it deserves.

About Info-Tech

91ÖÆÆ¬³§ is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

MEMBER RATING

9.4/10
Overall Impact

$134,822
Average $ Saved

48
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

You get:

  • Discover and Classify Your Data – Phases 1-3
  • Data Classification Steering Committee Charter
  • Data Classification Policy
  • Data Classification Standard
  • Data Classification RACI Tool
  • User Data Handling Requirements Tool
  • Data Discovery Interview Tracking Tool
  • Data Classification Verification Tool
  • Data Classification Inventory Tool
  • Data Classification Metrics Tracking Tool
  • Data Classification Program Communication Deck
  • Data Classification Awareness Pamphlet
  • Data Classification Awareness Poster

Need Extra Help?
Speak With An Analyst

Get the help you need in this 3-phase advisory process. You'll receive 6 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Formalize the Classification Program
  • Call 1: Establish a data classification steering committee.
  • Call 2: Formalize data classification documentation.

Guided Implementation 2: Discover the Data
  • Call 1: Plan data discovery.
  • Call 2: Implement data discovery.

Guided Implementation 3: Classify the Data
  • Call 1: Classify the data.
  • Call 2: Maintain and optimize the program.

Authors

Safayat Moahamad

Logan Rohde

Contributors

  • Charles Tatosi Chavapi, Information Security Manager, Tadebswana Mining Industry
  • Jim Finlayson, IT Director, City of Grand Junction
  • Diane Kelly, Information Security Manager, Colorado Judicial ITS
  • Ken Dewitt, IT Director, Navajo County
  • Liam Guan, Enterprise Information Management Advisor, Ontario Lottery and Gaming Corporation
  • Leon Letto, Senior Technical Sales Engineer, AirWatch
  • Jim McGann, Vice-President, Marketing and Business Development, Index Engines, Inc.
  • Ian Parker, Head of Information Security, Risk and Compliance, Fujitsu
  • Doug Waram, Director of IT, County of Wellington
  • William Mendez, Information System Security Officer, City of Miami
  • Claudiu Popa, President & CEO, Informatica Corporation
  • Chris Whiting, Solutions Architect, APA Group
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171