Data Mapping
Know WHAT you have
All risk management should start with an understanding of threat. Combining an understanding of your threats with your vulnerabilities enables fast and effective improvements to your cyber security. As well as assessing GDPR compliance, the results of the mapping exercise will identify any security gaps in your organisation