Discovering and managing sensitive information

Original price was: € 199,00.Current price is: € 0,00.


The abbreviation ICT stands for information and communication technology. A little information on the history: when computers became ordinary work tools in the 1960’s, everyone was talking about the metamorphosis of offices into paperless environments. 40 years later, paper is often still the main – or at least a very important – communication medium in offices. Corporate offices have 3 times more paper than their home counterparts. And so, the proper tracking of access rights, archiving and documentation is pivotal.

SKU: 8239010e-a1ba-45c7-a050-b5242cb7a987 Category: Tags: , , , , , , , , , , , , , , , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The auditor who needs to do a due diligence.
  • The accountant who needs to formally sign off her auditor's report.
  • The CIO who needs to ensure a data privacy infrastructure.
  • The compliance manager who requires a formal investigation into document management.
  • The CISO who wants to tick off issues concerning sensitive information.
how to find what you need

where do you look for it?

when should you delete something?

why is it important to keep your data safe and secure?

how can we store our information securely?

how do we make sure that the right people have access to the right information at all times?

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. Have you applied the principle 'least privilege' when users have access to IT systems?
  1. Not
  2. Ad hoc
  3. Relevant business processes are mapped out AND a list of users/roles and associated IT privileges has been established

Q. Is sensitive information stored in one central location?
  1. Not OR a location is chosen ad hoc OR different locations which makes the access slow and difficult to control
  2. There is ONE but the flow is not clear to everyone involved
  3. A clear procedure exists that everyone involved follows when sensitive data are sent/received
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Discovering and managing sensitive information”

    Your email address will not be published. Required fields are marked *