Information security and the organization



The safety of business data is paramount. Protecting your clients, employees, and business partners is crucial. Make sure to handle information in a way that ensures protection against data leakage. Here is how you should handle information security in your organization.

SKU: 00caf819-8fc4-4153-8336-e44c8415e62f Category: Tags: , , , , , , , , , , , , , , , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The CTO that needs to find innovative ways to carry out vision projects, safely.
  • The ICT consultant who needs to provide the vision and implementation strategy of the company's strategic security agenda.
  • The storage team leader who needs to ensure the storage system works properly for the rollout of new product.
  • The boardroom advisor seeking new avenues to entice his board.
  • The new CIO who wants to speed up decision-making process.
protect your information

follow the rules and regulations

keep up to date with changes in legislation, standards and best practice

Physical security
how to secure physical assets

Cyber security
what is cyber security? how can you protect yourself from hackers?

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. Who drives the development of privacy and information security policy?
  1. IT
  2. Business
  3. Business and IT jointly

Q. How is data security risk assessed?
  1. Not OR only ad hoc where a breach has occurred
  2. Periodic risk analysis with a conclusion to the board when relevant
  3. Periodic risk analysis with an immediate formal escalation to the board when relevant
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
mckinseyfuture of european defence - exec sum.pdf
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Information security and the organization”

    Your email address will not be published. Required fields are marked *