C3WG / DSMM

Data Security Maturity Model
5 stars 1 forks source link

Key Results: Mapping to `tools and methods` #4

Closed stods21 closed 1 year ago

stods21 commented 1 year ago

V1 states “organizations are encouraged to investigate and identify the methods, tools, and processes that make the most sense for their unique needs.”

The group believes that identifying cross-industry good practice methods would be useful. This could form the basis of our subgroups and focus groups.

stods21 commented 1 year ago

Post-RSA activity