Summary
In this course, you’ll use a three-pronged approach to identify the most sensitive data and assets to your organization and classify that data to determine security gaps. This is an on-demand course that you can access and complete at your convenience. It takes 3 to 4 hours to finish and includes a series of short lessons (typically under 30 minutes each), a final project, and an exam. When you finish the course, you’ll have a completed Zero Trust Data Security Strategy Template to help you funnel the content you’ll cover around defining, dissecting, and defending your data into an actionable data security strategy.
Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
- Stay ahead of changing market and customer dynamics with the latest insights.
- Partner with expert analysts to make progress on your top initiatives.
- Get answers from trusted research using Izola, Forrester's genAI tool.