The data security of ICT in the corporate world

 0,00

WHAT IS IT ABOUT?

This questionnaire assesses the impact of ICT and data management on data security, storage, backup and recovery.

SKU: 744ff6cd-a45f-4c66-bb2b-31f1c959b2b7 Category: Tags: , , , , ,
Theme:
Available in: English, Dutch, French, German, Spanish
  • The IT department that needs to convince executive managers about the opportunity of implementing a data security system.
  • The CIO who is interested in helping his team with data management solutions.
  • The data analyst who requires an adequate system for data recovery.
  • The HR manager who wants to ensure that their data is stored safely and securely.
  • The business analyst that needs to review the company's current ICT setup for data protection.
Data Security
Understand data security risks

Data Storage
Ensure data storage efficiency

Data Backup and Recovery
Maintain data backup and recovery

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. What do you currently use to implement protective measures?
  1. No prevention measures in place.
  2. Policy and training provided, not adequately monitored and enforced.
  3. Multi-layered defense in place and monitored for effectiveness.

Q. How do you analyze data storage needs?
  1. We don't systematically analyze our data storage needs.
  2. We manually analyze our data storage needs.
  3. We use advanced analytics to dynamically analyze our data storage needs.
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
NAMETITLE PAPER
fticonsultingcovid-19-impacted-commercial-real-estate-landscape.pdf
mckinseyTime-for-change-How-to-use-the-crisis-to-make-fashion-sourcing-more-agile-and-sustainable.pdf
kpmgai-in-control.pdf
oliverwymanwinning-the-retail-battle-in-a-world-without-mask-restrictions.pdf
oliverwymanGetting-ahead-of-seven-supplier-disruptions_web_final.pdf
fticonsultingeconomic-impact-steel-aluminum-tariffs.pdf
gartnerhype-cycle-example.pdf
cognizantmodernizing-core-systems-reduces-operating-costs-codex4293.pdf
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.

Reviews

    There are no reviews yet.

    Be the first to review “The data security of ICT in the corporate world”

    Your email address will not be published. Required fields are marked *

    ALSO CHECKED THESE QUESTIONNAIRES?

    READY FOR SOME SERIOUS BUSINESS?