0/
checklist
Security & Privacy: Preliminary Checklist
Share this doc:
Before you take a privacy-centric view of your security infrastructure, use the following attack surfaces checklist.
At my organization, there is or are:
If you checked off any of the above boxes, you have some work to do.
These attack surfaces are all the places where your organization is vulnerable to cyber threats and attacks - and these problem areas are not discrete and disconnected gaps.
Next Steps
Assess your answers and make a plan. Where are the data protection gaps? How can you engage your team of cross-functional stakeholders to move the program forward?
For more on this topic, take the Course: