CIS Controls v7

Data Risk Best Practices

Download the Data Risk Best Practices for CIS Controls v7

Download the Data Risk Best Practices for CIS Controls v7

Data Risk Best Practices

  • This field is for validation purposes and should be left unchanged.

Data Risk Best Practices

The Data Risk Best Practices for CIS Controls v7 developed by the Infolock Data Advisory practice provide clear, practical guidance for assessing your organization’s data risk posture, identifying major gaps and weaknesses, planning a remediation strategy, and implementing better privacy and security controls over time:

  • Governance
  • Visibility
  • Protection

The Data Risk Best Practices scale up to your organization’s overall data risk program level, as well as down to individual data projects, compliance mandates, and customer or partner data handling requirements.

CIS Controls

Developed in 2008, IT security leaders use CIS Controls to quickly establish the protections providing the highest payoff in their organizations. They guide practitioners through a series of 20 foundational and advanced cybersecurity actions, where the most common attacks can be eliminated.

The CIS Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to thwart the most pervasive attacks. The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that provide a “must-do, do-first” starting point for every enterprise seeking to improve their cyber defense.