Tagged - data protection

Privacy Readiness Assessment Tool

Use this tool to determine your privacy program's maturity and to identify any initiatives needed to close gaps and boost maturity in assessed areas.

Backup Solution Providers: Your First Mate on the Voyage Over the Sea of Change With Cloud Backups

Backup and recovery operations was once a set-it-and-forget it design architecture with a static reference architecture. Then along came the cloud, disrupting everything...

Webinar: Build a Cost-Effective Security Compliance Program

Security teams need to implement proactive measures to reduce costs associated with compliance activities. During this session we will go through a tactical and strategic...

Webinar: Secure Your High-Risk Data

What’s the key to a data security plan that keeps your data safe and your organization out of the headlines? To remain current and flexible in how you process and retain...

AI Registers: Finally, a Tool to Increase Transparency in AI/ML

Transparency, explainability, and trust are pressing topics in AI/ML today. While much has been written about why these are important and what organizations should do, no...

Webinar: Prepare to Privacy-Proof Your AI Technology

Data privacy regulations and AI technologies might not seem like a logical pairing at first glance. However, with the right checkpoints in place, you can make your...

Build a Security Compliance Program – Executive Brief

Read this executive brief to understand how an information security compliance management program can be cost effective.

Security Compliance Process Template

Use this template to help document your information security compliance management program.

Build a Security Compliance Program – Phases 1-5

Read this blueprint to help build a cost-effective information security compliance management program.

Secure Your High-Risk Data

What’s the key to a data security plan that keeps breaches at bay? A multi-layered approach that covers all the bases and data sources. Comprehensive security that’s as...
  • guided implementation icon
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us