Master IT governance, data privacy engineering, and security management through hands-on practice.
Advanced hands-on labs for IT governance, data privacy, and security program management.
GlobalCorp IT Governance FrameworkCOBIT 2019Level 4 - Managed and Measurable18 monthsChief Executive OfficerStrategic and TacticalMonthlyBoard of Directors3 yearsAnnual with quarterly reviewsBalanced Scorecard$250,000ISO 31000Moderate risk tolerance for innovation, low for core systemsQuarterlyBoard of DirectorsUnified risk register% of IT projects aligned with business strategy (Target: 90%)IT ROI percentage (Target: 15%)Number of critical IT risks (Threshold: <5)% compliance with policies (Target: 95%)Real-time with monthly executive summary📄 Download and carefully study the IT Governance Framework report before answering these questions. These CGEIT-level questions test your understanding of the governance documentation you just created.
Question 1 of 3: According to the Framework Design section, what maturity level target was established for GlobalCorp's IT Governance Framework?
Question 2 of 3: The Organizational Structure section specifies who should chair the IT Steering Committee for strategic alignment. Who is identified as the proper chair?
Question 3 of 3: According to the Performance Metrics section, what is the target value for the Strategic Alignment KPI (% of IT projects aligned with business strategy)?
Not Configured
Standard: -
Configured: 0/4
Chair: Not Set
KPIs: 0
KRIs: 0
Progress: 0%
Status: In Progress
| Timestamp | Action | Details | Status |
|---|---|---|---|
| No activity yet | |||
All databases and file systemsCritical - Highest ProtectionHigh - Strong ProtectionMedium - Standard Protection147 assetsPatient health monitoring and care coordinationConsent + Legitimate Interest (Healthcare)HIPAA Authorization1,000,000 patientsEU to US (Adequacy Decision + SCCs)12 high risksProportionate and necessary for healthcareAES-256-GCMTLS 1.3Hardware Security Module (HSM)FIPS 140-2 Level 3Every 90 daysEnabled for data recoveryTransparent Data Encryption (TDE)AES-256 encrypted backupsPurpose Limitation - Only Required Fields45 fields removed35% reduction in data pointsCollect data over time, not upfrontToken-based replacementk=5 (each record indistinguishable from 4 others)Mask sensitive fields for non-prodStatistical aggregation (no individuals)Add noise to prevent re-identification7 years (HIPAA minimum)90 days after account closure6 years (compliance requirement)30 days rolling, encryptedCryptographic Erasure (destroy encryption keys)Certificate of Destruction30 days📄 Download and carefully study the Privacy-by-Design Architecture report before answering these questions. These CDPSE-level questions test your understanding of the privacy engineering documentation you just created.
Question 1 of 3: According to the Privacy Impact Assessment (PIA) section, how many high-risk privacy findings were identified during the initial assessment?
Question 2 of 3: The Encryption Controls section specifies the key rotation policy. How frequently should encryption keys be rotated according to the documented policy?
Question 3 of 3: According to the Data Minimization section, what percentage reduction in data collection was achieved by eliminating unnecessary fields?
Classified: 0/147
PHI/PII: -
Deployed: 0/25
Effectiveness: -
HIPAA: 0%
GDPR: 0%
High Risks: 12
Mitigated: 0
| Timestamp | Action | Details | Status |
|---|---|---|---|
| No activity yet | |||
Protect business assets while enabling innovation and growthDeliver risk-based security program aligned with business objectivesSupport revenue generation and operational efficiencyRisk-based - Prioritize by business impactSecurity-aware culture - Everyone responsible3-year roadmapChief Executive OfficerHybrid (In-house + MSSP)24/7/36512 analysts (4 Tier 1, 6 Tier 2, 2 Tier 3)Dedicated SOC Manager reporting to CISOSplunk Enterprise SecurityCrowdStrike Falcon15 incident response playbooks1 hour, MTTR 4 hoursCrowdStrike Threat Intelligence and Recorded FutureMISP and AlienVault OTXFS-ISAC (Financial) and H-ISAC (Healthcare)US-CERT and CISA AlertsMITRE ATT&CK FrameworkTLP-based sharing with partnersNIST SP 800-61 Rev 28 members (IT, Legal, PR, HR, Forensics)Dedicated IR ManagerQuarterly simulations24/7 on-call IR teamExternal forensics firm on retainerConduct BIA for all critical processes4 hours15 minutes (minimal data loss)Hot Site - Active datacenter ready for failover3-2-1 Rule (3 copies, 2 media, 1 offsite)Continuous replication for critical, hourly for othersAnnual full DR test, quarterly partial testsWork-from-home capability for all staff$8,500,000$4,200,000 (SOC, IR, GRC staff)$2,800,000 (SIEM, EDR, licenses)$600,000 (Awareness, certifications)$500,000 (Assessments, audits)$400,000 (Audit, legal)3-year ROI of 140% through risk mitigationCurrent: Level 2 - Repeatable
Target: Level 4 - Managed
Critical: 3
High: 4
MTTD: 72 hours
MTTR: 96 hours
Allocated: $0
% of IT Budget: -
| Timestamp | Event Type | Description | Severity |
|---|---|---|---|
| No security events logged | |||