Finding and Protecting the Crown Jewels – A Compliance Framework

Brian Tuemmler

Loading

Information Governance seems to manifest itself in multiple separate projects managed under a single roof. It is better than silos, but still not completely integrated. M365 strategies, for example, may not touch paper file management, which may not touch GDPR, which may not touch long term archival information.

I wanted to put together a high-level approach, based on a couple of real-life examples, that brings cybersecurity and breach-response into the same program structure as shared drive analysis and cleanup, with a dash of records management, and PII hunting.

The goal, in part, is to leverage tools and practices you may already have in place, but for multiple purposes. I refer in this ebook to file analysis tools (also called file indexing and auto-classification or eDiscovery or data discovery) and cloud-based governance tools like M365.

Download it here.

 © 2024 Infotechtion. All rights reserved 

Facebook
Twitter
LinkedIn
Email

By submitting this form you agree that Infotechtion will store your details and send future resources. You may opt-out any time.

Recent posts

Job application.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorestandard dummy text ever since.

Please fill the form

Job application.

Join Infotechtion for an impactful career filled with passion, innovation, and growth. Embrace diversity, collaboration, and continuous learning. Discover your potential with us. Exciting opportunities await!

Please fill the form

By submitting this form you agree that Infotechtion will store your details.
All information provided is stored securely and in line with legal requirements to protect your privacy. You may opt-out any time.