Information security in the workplace

Original price was: € 199,00.Current price is: € 0,00.

WHAT IS IT ABOUT?

The implementation of a complex digital transformation requires a lot of technological resources, besides a risk analysis and the establishment of security protocols. This questionnaire touches on some important aspects to consider.

  • The Chief Information Officer who needs a checklist for security matters
  • The CISO who wants to verify security around systems and processes.
  • The Chief technology officer who understands the importance of security.
  • Managing partner over a consultancy firm advising her clients on all matters security.
  • The CEO of a small technology firm who wants to make sure the organization's service portfolio is sufficiently secure.
Cyber security
a business challenge

ICT
the solution

Network
how to secure it all

Technology
how to use it safely and securely

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. What kind of formal arrangements exist to ensure that the relevant IT systems are safe from cyber attacks?
  1. No formal arrangements
  2. Have a strategy
  3. Have a strategy and a plan for implementation

Q. How is access to the Internet for visitors ensured?
  1. The user takes the risk
  2. User must make a formal application via the ICT department
  3. End user can use their own (BYOD) device to access the internet
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
NAMETITLE PAPER
cognizantthe-social-determinants-of-health-applying-ai-and-machine-learning-to-achieve-whole-person-care-codex4379.pdf
nmg-group30-march-On-a-Personal-Note-Toska-Kouskos-Q1-2015-Low-cost-solutions-for-employees-a-minefield1.pdf
capgeminiVMware-Big-Bet_Innovate-iPDF_2020-10-01_V04.pdf
pwcpwc-detecting-malicious-actors-who-attempt-to-compromise-credentials-that-access-your-IT-assets.pdf
cognizantFuture-of-Work-Enabler-Innovation.pdf
oliverwymanwhat-might-china-s-recovery-look-like.pdf
fticonsultinghow-much-is-your-startup-worth.pdf
infosyshrd.pdf
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.

Reviews

    There are no reviews yet.

    Be the first to review “Information security in the workplace”

    Your email address will not be published. Required fields are marked *

    ALSO CHECKED THESE QUESTIONNAIRES?

    READY FOR SOME SERIOUS BUSINESS?