SlideShare a Scribd company logo
1 of 1
Workshop Overview
Day 1 Day 2 Day 3 Day 4 Day 5
Activities
Identify Internal and
External Drivers
Assess the Current State Identify Gaps and Define
Initiatives
Develop Implementation
Plan and Define Metrics
Next Steps and
Wrap-Up (offsite)
1.1 Review the business context.
1.2 Review compliance drivers and
relevant regulatory
frameworks.
1.3 Discuss current drivers from
both the InfoSec and business
context.
1.4 Define the scope; which data
sources will be examined, and
what is the tier of data
(classification standard) in
focus for this project?
2.1 Map the flow of all high-risk,
highly sensitive data in-scope
for project workshop (at-rest
and in-transit); document and
compare with Data Inventory.
2.2 Review current set of data
security controls.
2.3 Identify and list future or
potential adjustments to the
organization’s data security
landscape.
2.4 Complete Data Security Matrix
and recommended action
items.
3.1 Review data security Gaps.
3.2 Identify gap-closing initiatives
in-scope for each of the seven
areas of data security.
3.4 Allocate cost and effort values,
and prioritize initiatives.
3.5 Compare against compliance
obligations and security
frameworks.
3.6 Define execution waves and
initial timeline for
implementation.
4.1 Finalize implementation
roadmap for data security
initiatives.
4.2 Identify scope of employees or
end-users impacted by
changes to data security
landscape.
4.3 Develop training plan for any
process or administrative-
based initiatives.
4.4 Define metrics for
measurement of data security
program success.
4.5 Outline schedule for monitoring
and reporting.
5.1 Complete in-progress
deliverables from previous four
previous four days.
5.2 Set up review time for
workshop deliverables and to
and to discuss next steps.
steps.
Deliverables
1. Set of data security objectives
objectives
2. Mapped compliance matrix
matrix
3. Defined project scope
1. Revised Data Inventory
2. Completed Data Security Matrix
Matrix (compliance frameworks
frameworks and security
controls)
1. Finalized Data Security Matrix
Matrix
2. Completed Data Security
Initiatives list
1. Finalized Data Security
Roadmap
2. Data Security Metrics
3. Outline for Data Security
Technical report
1. Completed and delivered Data
Security Technical Report and
Executive Presentation
2. Additional recommendations
based on days one to four of
workshop

More Related Content

Similar to Workshop Overview.pptx

Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxklinda1
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxlesleyryder69361
 
Unit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptxUnit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptxVrundaPatadia
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
ORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docxORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docxvannagoforth
 
Devry cis 321 week 4 milestone 4 part 1
Devry cis 321 week 4 milestone 4 part 1Devry cis 321 week 4 milestone 4 part 1
Devry cis 321 week 4 milestone 4 part 1uopassignment
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureGoutama Bachtiar
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxnikshaikh786
 
Implementation roadmap.docx
Implementation roadmap.docxImplementation roadmap.docx
Implementation roadmap.docxssuserf1bae5
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Ict journal layout
Ict journal layoutIct journal layout
Ict journal layoutFifeCollege
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupFeroot
 
Presentation of Gantt Chart (System Analysis and Design)
Presentation of Gantt Chart (System Analysis and Design)Presentation of Gantt Chart (System Analysis and Design)
Presentation of Gantt Chart (System Analysis and Design)Mark Ivan Ligason
 
Systems Lifecycle workbook
Systems Lifecycle workbookSystems Lifecycle workbook
Systems Lifecycle workbookMISY
 
· Choose an information system for an individual project.  During .docx
· Choose an information system for an individual project.  During .docx· Choose an information system for an individual project.  During .docx
· Choose an information system for an individual project.  During .docxLynellBull52
 
AMC Optimized Data Protection Strategy
AMC Optimized Data Protection StrategyAMC Optimized Data Protection Strategy
AMC Optimized Data Protection Strategytcollins3413
 

Similar to Workshop Overview.pptx (20)

Unit 4.pptx
Unit 4.pptxUnit 4.pptx
Unit 4.pptx
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
We Bought Some Tools
We Bought Some ToolsWe Bought Some Tools
We Bought Some Tools
 
Unit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptxUnit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptx
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
ORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docxORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docx
 
Object oriented analysis and design unit- i
Object oriented analysis and design unit- iObject oriented analysis and design unit- i
Object oriented analysis and design unit- i
 
Devry cis 321 week 4 milestone 4 part 1
Devry cis 321 week 4 milestone 4 part 1Devry cis 321 week 4 milestone 4 part 1
Devry cis 321 week 4 milestone 4 part 1
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT Architecture
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptx
 
Implementation roadmap.docx
Implementation roadmap.docxImplementation roadmap.docx
Implementation roadmap.docx
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Ict journal layout
Ict journal layoutIct journal layout
Ict journal layout
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
 
Presentation of Gantt Chart (System Analysis and Design)
Presentation of Gantt Chart (System Analysis and Design)Presentation of Gantt Chart (System Analysis and Design)
Presentation of Gantt Chart (System Analysis and Design)
 
Systems Lifecycle workbook
Systems Lifecycle workbookSystems Lifecycle workbook
Systems Lifecycle workbook
 
· Choose an information system for an individual project.  During .docx
· Choose an information system for an individual project.  During .docx· Choose an information system for an individual project.  During .docx
· Choose an information system for an individual project.  During .docx
 
AMC Optimized Data Protection Strategy
AMC Optimized Data Protection StrategyAMC Optimized Data Protection Strategy
AMC Optimized Data Protection Strategy
 

Recently uploaded

Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Recently uploaded (20)

Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Workshop Overview.pptx

  • 1. Workshop Overview Day 1 Day 2 Day 3 Day 4 Day 5 Activities Identify Internal and External Drivers Assess the Current State Identify Gaps and Define Initiatives Develop Implementation Plan and Define Metrics Next Steps and Wrap-Up (offsite) 1.1 Review the business context. 1.2 Review compliance drivers and relevant regulatory frameworks. 1.3 Discuss current drivers from both the InfoSec and business context. 1.4 Define the scope; which data sources will be examined, and what is the tier of data (classification standard) in focus for this project? 2.1 Map the flow of all high-risk, highly sensitive data in-scope for project workshop (at-rest and in-transit); document and compare with Data Inventory. 2.2 Review current set of data security controls. 2.3 Identify and list future or potential adjustments to the organization’s data security landscape. 2.4 Complete Data Security Matrix and recommended action items. 3.1 Review data security Gaps. 3.2 Identify gap-closing initiatives in-scope for each of the seven areas of data security. 3.4 Allocate cost and effort values, and prioritize initiatives. 3.5 Compare against compliance obligations and security frameworks. 3.6 Define execution waves and initial timeline for implementation. 4.1 Finalize implementation roadmap for data security initiatives. 4.2 Identify scope of employees or end-users impacted by changes to data security landscape. 4.3 Develop training plan for any process or administrative- based initiatives. 4.4 Define metrics for measurement of data security program success. 4.5 Outline schedule for monitoring and reporting. 5.1 Complete in-progress deliverables from previous four previous four days. 5.2 Set up review time for workshop deliverables and to and to discuss next steps. steps. Deliverables 1. Set of data security objectives objectives 2. Mapped compliance matrix matrix 3. Defined project scope 1. Revised Data Inventory 2. Completed Data Security Matrix Matrix (compliance frameworks frameworks and security controls) 1. Finalized Data Security Matrix Matrix 2. Completed Data Security Initiatives list 1. Finalized Data Security Roadmap 2. Data Security Metrics 3. Outline for Data Security Technical report 1. Completed and delivered Data Security Technical Report and Executive Presentation 2. Additional recommendations based on days one to four of workshop