Security - Storyboard

Build a Data Privacy Program – Phases 1-4

Sell privacy to the business by speaking a language they understand. Take a quantitative approach to integrating privacy within the scope of your organization and build a...

Build a Data Privacy Program – Phase 1: Collect Privacy Requirements

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the key drivers and expectations of privacy from all areas of your organization.

Build a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Build a Data Privacy Program – Phase 4: Implement and Operationalize

This phase of the blueprint, Build a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...

Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and Build the Roadmap

Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...

Cybersecurity Priorities in Times of Pandemic Storyboard

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. IT is supporting business continuity...

Ensure Your Pandemic Response Plan Is Privacy-Proof Storyboard

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time-sensitive, scalable,...

Reinforce End-User Security Awareness During Your COVID-19 Response Storyboard

Augment your security and training program with considerations for remote users during the COVID-19 pandemic.

Build Your Security Operations Program From the Ground Up – Phases 1-4

Use this blueprint to establish your security operations program with a threat collaboration environment.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us