ITauditSecurity
Skip to content
  • Home
  • About
  • Links
  • SiteMap
  • Twitter
  • Hidden
  • Copyright

Tag Archives: stop the bleeding

by ITauditSecurity | April 29, 2024 · 6:46 am

11 Ways to Really Reveal Data Maturity

If you want to measure (or audit) data maturity in your company, many different data maturity models exist. ISACA has one, the IIA has one, and the Big 4 all have one.

In fact, data maturity models are everywhere, and they can be helpful. But regardless of the score your company gets when rated by one of these models, the actual maturity is often much worse.

Continue reading →

Share this:

  • Print (Opens in new window) Print
  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on Telegram (Opens in new window) Telegram
  • Share on Pocket (Opens in new window) Pocket
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
Like Loading...

2 Comments

Filed under Audit, Data Analytics, Data Science, Technology

Tagged as accuracy, alert, automation, big 4, CCPA, clean, corrupted, counts, data, definition, dictionary, ETL, fail, find, gandalf, iia, import, isaca, lineage, maturity, model, obtain, proactive, safe, secret, stop the bleeding, system ID, total, transfer, transform, usage, validation

  • Enter your email address to to be notified of new posts by email.

    Join 763 other subscribers
  • Quick Links

    New IT Auditors Start Here
    CISA
    ACL Tips
    Blogging Tips
    Excel: Basic Data Analytics
    Ask a Question
    Reader Poll: Who R U?

  • Recent Posts

    • Skills Needed for IT Auditors of the Future
    • low code/no code rant
    • No Ticket Required for Security App Changes? Conclusion
    • No Ticket Required for Security App Changes? P3
    • No Ticket Required for Security App Changes? P2
    • No Ticket Required for Security App Changes? P1
    • How to Monitor Your Company’s Emerging Risks
    • Hard Truths about Internal Audit
    • 11 Ways to Really Reveal Data Maturity
    • 25 Hard-Hitting Lessons from 17 Years in Cybersecurity
  • Top 7 Posts

    • CISA vs. CIA Certification
    • Free Downloads
    • Hidden
    • Master List of CISA Articles
    • About
    • Free CISA Prep: Self-Assessment Exam
    • How to Describe What an IT Auditor Does?
  • Categories

ITauditSecurity · IT audit/security/analytics/analysis, HOW-TOs, humor, and a whole lot more…
Website Powered by WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • ITauditSecurity
    • Join 763 other subscribers
    • Already have a WordPress.com account? Log in now.
    • ITauditSecurity
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d
      Design a site like this with WordPress.com
      Get started