Secure Your High-Risk Data

Develop a comprehensive data security plan focused on the “crown jewels”.

If you're already a member, click here to log in.

Major Business Pain Points

  • Securing data is no longer as simple as implementing a set of controls around a specific application and database.
  • Sensitive and high-risk data now lives in various repositories both in and out of the organization, in both on-prem and cloud environments.
  • Layer in the process of exchanging data and ensuring secure transfer of this information while keeping it accessible, and the challenge becomes increasingly complex.
Secure Your High-Risk Data-Pain Points


Key Points

  • A modern data security strategy must protect data through the entire data lifecycle.
  • Data security efforts must be business-focused, with multi-layered defense, while extending to all data sources.


Secure Your High-Risk Data-Recommendations
  • An understanding of what the compliance obligations for the organization are, and how the security controls in place ensure full adherence.
  • An overview of technical and supporting process controls to evaluate and implement to enhance data security
  • A prioritized set of data security initiatives based on cost, effort, and compliance and business risk values.

Methodology and Tools

Executive Brief

The Secure your High-Risk Data takes a multi-faceted approach to the challenges around comprehensive data security. This research incorporates foundational technical elements, compliance considerations, and supporting processes and policies.

  • Secure Your High-Risk Data – Executive Brief
  • Secure Your High-Risk Data – Phases 1-3

1. Review data security methodologies

Review each of the technical and process controls involved in securing the organization’s high-risk data, mapped to corresponding compliance requirements.

  • Secure Your High-Risk Data: Phase 1 – Review Data Security Methodologies
  • Data Security Matrix

2. Build the data security plan

Begin to close the gaps in your organization’s data security plan by creating a prioritized roadmap of targeted initiatives that cover data-at-rest, in-transit, and in-use.

  • Secure Your High-Risk Data: Phase 2 – Build the Data Security Plan
  • Data Security Technical Report

3. Implement the data security plan

Tie off any loose ends in your data security plan, by ensuring impacted staff are properly trained and supported. Identify and track metrics for each of the control categories to ensure continuous improvement.

  • Secure Your High-Risk Data: Phase 3 – Implement the Data Security Plan
  • Data Security Executive Report

All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.