Security and privacy in the digital age



Cybersecurity requires an organizational approach. Introduce a culture that increases awareness and enforcement of security and privacy regulations, integrates a set of tools and processes, and requires a toolbox of security professionals and specialists.

SKU: 3212a112-6eb2-4d02-be78-cb3c559c30d7 Category: Tags: , , , , , , , , , , , , , , , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The project manager who has to handle privacy and collaboration between teams.
  • The CISO who needs to ensure seucity and privacy is warranted.
  • The CIO who has got the difficult request from the board to evaluate the IT performance.
  • The implementation manager who needs a project plan to handle the different ICT projects go forward.
  • The SME owner who needs to prepare the company for the future change.
Identify the risk
know what is at risk

Define the objectives
understand what needs to be protected

Determine controls
identify and implement appropriate controls

Monitor progress
review and evaluate effectiveness of security measures

Evaluate results
measure success against goals, risks, resources and priorities

Adapt to change
ensure that you are always on top of changing threats or opportunities

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. Do users know how to use passwords?
  1. No formal process
  2. Users are informed and will use the most secure password
  3. Process and best practice is known to all and is driven from the top

Q. To what extent do users identify the risks?
  1. Not or ad hoc reported to me (risk owner)
  2. Reported to me (risk owner) but I have to ask for more information
  3. Risks identified proactively by the user and documented by me (risk owner)
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Security and privacy in the digital age”

    Your email address will not be published. Required fields are marked *