Content Map: Get compliant

Slides:



Advertisements
Similar presentations
POWERPROTECTPROMOTE Power Protect Promote Change PPP text colors in View/Master Mode > highlight the target P area in white and make the others gray Title.
Advertisements

Energy Education Strategy for Program Years October 26, 2011.
RED HAT PRODUCT FOCUS 3/17/14 – 3/28/14 INTRODUCTION Our Product Focus for the next two weeks is Red Hat. Red Hat is a maker and distributor of enterprise.
Small Business Solver| Small Business Advice at your Fingertips Providing the Most Up to Date and Comprehensive Set of Tools, Webinars and Resources for.
PRODUCT FOCUS 3/3/14 – 3/17/14 INTRODUCTION Our Product Focus for the next two weeks is IBM. The opportunity afforded to us in becoming an Authorized.
PRODUCT FOCUS 2/3/14 – 2/14/14 INTRODUCTION Our Product Focus for the next two weeks is VMware. VMware is the current industry leader in server / data.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
COLLABORATIVE SOLUTIONS PRODUCT FOCUS 6/23/14 – 7/3/14.
THE BUSINESS OF IT PRODUCT FOCUS 7/7/14 – 7/18/14.
PRODUCT FOCUS 3/31/14 – 4/11/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft’s Lync. Over 70% of the Fortune 500 have adopted Lync.
CREATING THE ENTERPRISE SOCIAL MEDIA GAME PLAN September 2013.
Teaching and Learning in a Web 2.0 World. Review Review of Session 3  Overview of Twitter and Facebook  Learning benefits of Twitter and Facebook 
Using the AASHTO Audit Guide for the Development of A/E Consultant Indirect Cost Rates Introduction Target Audience Course Structure Learning Outcomes.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Project Management Basics
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Good Recruitment Campaign Information for Employers Slides for recruiters to use at client meetings.
Security and resilience for Smart Hospitals Key findings
Leadership Development at Bruce Power
MEM Cybersecurity Working Group Update to PCD Technical Committee
Forging the trail from solo admin to center of excellence
MEM Cybersecurity Working Group Update to PCD Technical Committee
Data Architecture World Class Operations - Impact Workshop.
Supporting New and Emerging ISAOs 01 September 2016
BAPI Communities.
Project Management (x470)
GEO WP 1. INFRASTRUCTURE (Architecture and Data Management)
How to Develop and Instill a Future Focus in a Team
Evaluating Partnerships
Work Plan Management GEO Work Plan Symposium 30 April – 2 May 2012
Sharing Learning Data with the Business
President’s Administrative Innovation Fund: Connecting IT Subject Matter Expertise CIO Council Update
Learning Management System
BIS 221 Education for Service-- tutorialrank.com
Oracle Cloud: The Who, What, Where, When and Why
Microsoft 365 – Make it real with GTM Accelerators
Getting Started with Your Malnutrition Quality Improvement Project
Integrating Technology: Some Things You Should Know
HIGHLIGHTING THE KEY CHANGES
SAM GDPR Assessment <Insert partner logo here>
Debi Kuchka-Craig, FHFMA
Get Ready for GDPR Compliance
UQ Course Site Design Guidelines
Predetermined Objectives – 2013/14
The National Working Group
Continuity Guidance Circular Webinar
COURSE DEVELOPMENT PROCESS OVERVIEW AND GUIDELINES
UQ Course Site Design Guidelines
Research Fact Sheet Template
Automating Profitable Growth™
Nutrition Cluster Advocacy
Third-party risk management (TPRM)
RAMP-TRIM Training modules ppt Training Modules Overview Highlights
Organization Design Project support overview Presenter's Name
CyberSecure: Your Medical Practice
KEY INITIATIVE Financial Data and Analytics
KEY INITIATIVE Shared Services Function Management
KEY INITIATIVE Finance Function Management
KEY INITIATIVE Shared Services Optimization
Workforce Planning Project support overview Presenter's Name
Gallery Nurture Sequence
Finance strategy Project support overview.
Gartner for Sales Leaders
Data Privacy by Design Expanding Security for bepress Users
KEY INITIATIVE Internal Control and Technical Accounting
CGSB and Electronic Records
Wide Ideas Idea Management Software Idea Management Process
OU BATTLECARD: Oracle Utilities Learning Subscription
Central New York HEALTH EMERGENCY PREPAREDNESS COALITION
Presentation transcript:

Content Map: Get compliant Asset Gated Message Format Status ATTRACT Best practices for demonstrating and measuring value of compliance to the org N Executive summary/intro to PwC report Executive Summary PDF Q3 2017 PWC report insights PwC SME contributed blog Blog, podcast PWC report introduction Sue Trombley blog PWC results: Highlights Graphical view of PwC findings Infographic Highlights of key findings Animated video highlighting findings of report Video ENGAGE PwC risk index Y Full report WP 5 steps to demonstrating the value of compliance in your org How-to tips, based on recommendations in the report Checklist Information landscape academy course Foundational course on variety of info to be managed E-learning tool Existing RIM basics academy course Overview of the importance of proper records management for org training Compliance academy course Tools to create an internal culture of compliance ACCELERATE Measuring your risk index Interactive calculator Calculator Webinar roundtable to discuss findings Discussion of research findings featuring internal and external SMEs Webinar Q4 2017

Content Map: Stay compliant Asset Gated Message Format (Snackable vs Heavy) Status ATTRACT External compliance challenges: Data privacy N Learn how data privacy affects you as an information manager Video Existing External compliance challenges: GDPR Learn what’s expected to meet the requirements of the upcoming GDPR External compliance challenges: Managing legacy data Guidance for managing legacy data ENGAGE External Compliance (Managing legacy data): Take away sheet How to manage and access legacy data in your organization PDF External compliance (Data privacy): Take away sheet How to ensure you’re following best practices to safeguard your organization's information External compliance (GDPR): Take away sheet Tips for ensuring you’re meeting the critical components of the upcoming GDPR. Security and privacy academy courses Two courses to educate orgs on steps necessary to manage risk E-learning tool Compliance academy course Tools to help you manage compliance regulations ACCELERATE Compliance workbook Y Measure and benchmark your internal compliance program Interactive workbook RIM/Risk Guide Best practices for building a RIM program that helps mitigate risk Best Practices Guide

Content Map: Creating a compliance culture Asset Gated Message Format Status ATTRACT Internal compliance challenges: Training N What to consider when implementing a compliance training program Video Existing Internal compliance challenges: Metrics and tracking Best practices for implementing metrics around a compliance program Internal compliance challenges: Defensible disposition Considerations for being compliant when disposing information ENGAGE Internal compliance (Training): Take away sheet How to get started with a compliance training program PDF Internal compliance (Metrics): Take away sheet How to get started with measuring your compliance program Internal compliance (Defensible disposition): Take away sheet How to defensibly dispose of information Information governance course How to create a governance council E-learning Compliance academy course Tools to create an internal culture of compliance ACCELERATE Compliance workbook Y Measure and benchmark your internal compliance program Interactive workbook Late March 2017 (In final production) Practical Guide to IG Best practices for implementing an IG program Best Practices

Content Map: Creating a compliance culture Asset Gated Message Format Status ATTRACT Benefits of a collaborative approach to compliance N Importance of following a multi-disciplinary approach to compliance Article New Words of the week/Speak Easy blog series Showcase and define terminology for communicating with different business units Social, Blog ENGAGE How to bridge the gap b/w IT and compliance: One word at a time Compilation of words of week and related blogs eBook/toolkit How to bridge the gap b/w real estate and compliance: One word at a time How to bridge the gap b/w procurement and compliance: One word at a time Compliance academy course Tools to create an internal culture of compliance E-learning tool Existing Information governance academy course How to communicating the value of a governance program across the org E-learning course ACCELERATE Bridging the gap: Compliance/IT use cases: Data privacy, cybersecurity Best practices/examples of compliance and IT working together on topics incl data privacy, cybersecurity Use case/case study Bridging the gap: Compliance/Real estate use cases: A and B Best practices/examples of compliance and RE working together Bridging the gap: Compliance/procurement use cases: A and B Best practices/examples of compliance and procurement working together Practical Guide to IG Y IG best practices Best Practices Guide

Content Map: Proving value of compliance Asset Gated Message Format Status ATTRACT Building the case for compliance N PPT template to be used to sell the story of compliance to the c-suite Slideshare, Podcast interviews New Addressing RIM compliance issues Identifies key compliance issues in many organizations Article Existing ENGAGE 5 ways to strengthen compliance Tips to strengthen your compliance program internally WP Compliance fundamentals Problem/solution worksheet PDF (existing as part of a WP. Needs updating) Information economics academy course How to prove value of information management E-Learning tool Data analytics academy courses How to extract value from your information to make informed decisions E-learning tool ACCELERATE Cost of compliance vs non-compliance Showcase use cases and risks involved in not being compliant Use case/case study Information management compliance: An outsourcing guide Benefits of leveraging outsourcing services to enhance internal compliance programs WP (exists, needs updating)