Report
Management and Leadership
Data Inventory and Mapping
Rebecca Herold
This document breaks down how organizations like yours should approach Data Inentory and Mapping by creating an accurate, up‑to‑date view of what data exists; how it moves; and who processes it across systems, products and services.
This Principle underscores that maintaining data inventories and flow maps is essential for identifying and managing privacy‑related security risks. This visibility enables teams to meet obligations like RoPA, DSARs and vendor oversight while enforcing governance and lifecycle controls.
Find similar resources
Ask-An-Expert Writeup
Board Communication and Metrics
The CISO in 2030: Build Skills Now to Lead as the Role Evolves
This Ask-an-Expert writeup provides a prescriptive roadmap for transforming security from a perceived business blocker into a trusted service provider.

Jeffrey Brown
Ask-An-Expert Writeup
Team Structure and Management
Structure Cybersecurity Teams for Resilience
This Ask-an-Expert writeup shows how security leaders can use NIST-aligned maturity frameworks to deliberately structure teams, roles and governance models that strengthen cybersecurity and operational resilience.

Munish Walther-Puri
Ask-An-Expert Writeup
Service Catalog/Centers of Excellence
Transform Security From a Blocker to a Business Enabler
This Ask-an-Expert writeup provides a prescriptive roadmap for transforming security from a perceived business blocker into a trusted service provider.

Taryn Swietek
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.