Skip to main contentSkip to navigationSkip to footer

Data Security and Information Governance

13 minPRO
3/6

Key Takeaways

  • Classify data into four tiers (Public, Internal, Confidential, Restricted) with handling rules for each.
  • Apply the principle of least privilege—team members access only what their role requires.
  • Revoke departing employee access within 24 hours; use multi-factor authentication on all critical systems.
  • A documented breach response plan reduces response time by 50-70%.
This track contains subscriber-only lessons

Explore free tracks in this area of study, or subscribe for full access.

Browse available tracks
"Process Failure Modes, Data Security & Disaster Recovery" is a Pro track

Upgrade to access all lessons in this track and the entire curriculum.

Test Your Knowledge

1.What is operational risk?

2.What is a risk register?

3.What is the Recovery Time Objective (RTO)?