Cyber Defense Magazine – July 2019

(Sean Pound) #1

Here’re a few things to consider while devising your very own cyber security strategy (especially
for your business):



  • Set your Priorities right and add some actionable steps


◦ The first to building a solid cyber security strategy is to set your priorities. And, almost
every business will have some diverse set of priorities to work on. Evaluate what’s most
important, and what’s less, at the end of the day, you have to be very clear about why you
actually need a cyber security strategy, as that will help you to build a powerful plan.

◦ Start noting down the priorities along with the steps to depict what exactly would you like
to do and in which order. This is basically the foundation that you need in order to develop
a very powerful cybersecurity set up. Also, a well thought of priority list will help you and
your team curate a very efficient implementation process.

◦ Along with the priorities, make sure you also note down the required actionable next steps.
The steps may also include the requirement of more resources, the need of advanced
tools and programs etc. Though, it will further need more time to finally decide on what
you want to exactly invest in. So, basically, you will need to rank your priorities and then
work on them one by one. This is similar to game of chess that requires a lot of planning
initially as well as at later stages in order to reap benefits.

◦ And, one of the key things to consider here is that your priority list would not be the same
as some other business’ list as every firm has a diverse set of cyber threats.


  • A thorough technology roadmap
    ◦ In order to conceptualize a strong cyber security strategy, you will have to also create a
    tech roadmap. It should include things like, servers required to attain compliance
    requisites, the number of projects which have to be completed etc. The roadmap should
    be highly technically-focused at the same time, it should also have detailed timelines set
    for different things.
    ◦ The tech focused roadmap should also include the tools or programs the company is
    using, and what will they need in the future. You may want to include the financial elements
    related to different tech products as well.
    ◦ Though, it is suggested to get the business leaders from different verticals to sit together
    and cerate this roadmap. Every part of the business should be covered and reflected in
    this technology roadmap.

  • Use a threat model for highly efficient response and mitigation processes


◦ HIPAA, GDPR and a host of other compliance standards offer a thorough list of
security methods and controls which have to be adopted. However, it is suggested to
design the cyber security architecture as per the high priority cyber threats and
vulnerabilities of the company.
Free download pdf