There are 8 steps to planning out your cybersecurity strategy including:
- Conducting a security risk assessment.
- Setting your security goals.
- Evaluating your technology.
- Selecting a security framework.
- Reviewing security policies.
- Creating a risk management plan.
- Implementing your security strategy.
- Evaluating your security strategy.
Many businesses have begun to realize the risk cyber attacks pose on their operations, reputation, and revenues.
While pouring investments into security controls like monitoring tools, multifactor authentication, security awareness, and other security best practices have their merits.
A truly secure business has a sound cybersecurity strategy in place with a well defined pathway to address future security requirements.
In this article, I am going to explain each step of this process in detail.
By the end, you will have all the knowledge you need to develop the foundation of your security strategy whether you’re a small business or enterprise.
Free Security Policy Templates
Get a step ahead of your cybersecurity goals with our comprehensive templates.
What You’ll Learn
- How cybersecurity strategies are evolving to defend against current threats.
- Why implementing a cybersecurity strategy is more critical than ever for enterprises and SMBs.
- A step-by-step breakdown of a security strategy process that you can start to implement today.
- Common pitfalls to avoid when developing and implementing your cybersecurity strategy.
What Is A Cybersecurity Strategy?
A cybersecurity strategy is a plan that involves selecting and implementing best practices to protect a business from internal and external threats.
This strategy also establishes a baseline for a company’s security program which allows it to continuously adapt to emerging threats and risks.
Defense In Depth Strategy
To effectively manage emerging threats and risks today, the cybersecurity strategy should consider implementing defense in depth.
The goal of implementing this strategy encompasses the layering of security defenses.
When applied correctly, this strategy increases an organization’s ability to minimize and limit the damage caused by a threat actor.
A company may implement a combination of multiple tools to protect their endpoint devices, such as antivirus, anti-spam, VPN, and a host firewall.
Zero Trust Security + Defense In Depth
Layering multiple tools to create defense in depth is a solid approach towards laying the foundation for a sound security strategy, however, a company must have resources available to support and monitor the functionality of the tools.
This may introduce additional complexity.
To address this issue, a zero trust model should be implemented as well.
Zero trust implies, never trust, always verify.
Multifactor authentication and machine learning are components of zero trust, which provides the company with visibility on who and how the assets are being utilized within the network.
Cybersecurity Strategy For Enterprise VS Small Business
How is a security strategy different between enterprise and small business?
The primary difference between a large organization and a SMB (Small to Medium sized Business) is the number of employees and revenue.
Regardless of the size of the business, both types of companies can be targets of threat actors.
An SMB that handles HIPAA data is required to abide by the same regulations as a large enterprise.
A large enterprise has a larger footprint of data to secure and may require a larger investment in an IT budget to invest in the proper controls to secure the data, however, threat actors and email phishing do not discriminate based on the number of employees.
It is obvious that the larger revenue-generating organizations are prime targets for an attack.
The enterprise in most cases has insurance and may have funds available to pay up in a ransomware attack.
Read More: How To Prevent Ransomware: An Expert Guide
It is a general perception that a SMB has limited budgets and resources to fully secure their networks.
This makes them also susceptible to attacks.
Therefore, a cybersecurity strategy is just as essential to the large enterprise as the SMB.
The business model and assessed risk the organization has in its care determine the security needs of the business.
Affordable Security Options Available For SMBs
The challenge SMBs face have to deal with tight budgets, resource planning, staying current with technology, and staying competitive in their markets.
To meet the challenge, careful planning of where expenditures are needed is paramount, particularly when it involves the security of their business.
The good news is that many security vendors have adapted their large enterprise product suite to the SMB market.
Symantec/Broadcom, McAfee Small Business Edition, Microsoft Office 365 Business has subscriptions for less than 300 licenses.
Microsoft recently announced Microsoft Defendor for Business – an enterprise grade endpoint security designed for businesses with up to 300 employees.
At $3.00/mon per user, we predict this offering will attract a lot of attention in the SMB space to integrate into their existing Microsoft technology suite.
Why Are Cybersecurity Strategies Important?
Creating and implementing a cybersecurity strategy is more critical than ever as the number of security-related breaches during the pandemic increased by 600%.
Further, the average ransomware payment leaped 82% in 2021 to $572,000 from the previous year.
There’s no sign of these attacks slowing down and evidence to support that threat actors will only continue to attack vulnerable systems.
Increase In Recent Cyber Attacks
Cyber attacks are growing and becoming more disruptive to businesses overnight, and it’s only going from bad to worse with threat actors finding new methods of attack.
We’ve covered a number of the recent cyber attacks this year including:
- Microsoft Azure SSRF Vulnerabilities
- Slack GitHub Account Hack
- Data Of 228 Million Deezer Users Stolen
- Twitter Leaks Data On 200 Million Users
- Cisco Cyber Attack
- Twitter Zero-Day
- Starlink Dish Hacked
- Mantis Botnet
- Maui Ransomware Attack
- Conti Ransomware Attack
- The Kaseya Ransomware Attack
- Saudi Aramco’s $50 Million Data Breach
- Accellion FTP Data Breach
Continue Reading: Top 10 Most Exploited Security Vulnerabilities In 2022
Attacks are prominently increasing in all industries, with a recent study establishing that the retail industry is at the most risk to cyber attacks through social engineering methods.
89% of healthcare organizations have also experienced a data breach in the past 2 years, even though security measures had been put in place.
This is due to web applications connected to critical healthcare information being vulnerable to cyber attacks.
The threat is just as high for small businesses in almost every industry.
43% of cyber attacks target small businesses, a problem too big for small business owners to ignore.
Therefore, it is important to address your company’s cyber risk and define a strategy due to more organizations using online applications and cloud based applications.
With this being identified, the rapid increase in cyber attacks is inevitable and the effects can be simply, detrimental to your business.
The SolarWinds and Colonial gas pipeline ransomware attacks reveal how bad actors can uncover weaknesses in software code or poor security controls.
If these threat actors can pinpoint their attacks on systems that monitor the networks of the government and energy sources, hacking into your company unfortunately can be considered business as usual.
According to a 2021 security data breach report, there were 1,767 publicly reported breaches in the first six months of 2021, which exposed a total of 18.8 billion records.
Regulatory Requirement & Penalties
Different regulations and laws will levy fines against organizations if they are found to breach data or fail to comply with regulations, such as HIPAA, PCI, SOX, GBLA, or GDPR.
Due to the current growth of companies processing data, platforms such as storing data on the cloud and machines that supports the data has also increased.
The areas of attack and vulnerabilities to cyber attacks have increased due to more data being processed on premise or the cloud.
Recent worldwide data breach statistics indicate that many organizations are falling short on either the development or implementation of their cybersecurity strategy.
New Mobile Workforce
The COVID-19 pandemic has transformed the methods many people are working and will most likely continue to change how they work in the future.
VPN technology has been around for some time, however, this ability to remotely connect to the company’s network from their home or away from the office is common practice today.
According to a new forecast from International Data Corporation, the U.S. mobile worker population will grow at a steady rate over the next four years, increasing from 78.5 million in 2020 to 93.5 million mobile workers in 2024.
By the end of the forecast period, IDC expects mobile workers will account for nearly 60% of the total U.S. workforce.
The ability to work remotely has allowed many businesses to remain profitable, especially if the role of the employee does not require face-to-face interaction or handling of equipment.
However, remote working does introduce risk, such as, stolen devices containing downloaded sensitive files, or weak passwords or out-of-date software or applications can provide an easy entry for bad actors into the corporate network.
Data Center & Cloud Transformations
Today, businesses are leveraging the power of the traditional data center along with the cloud.
Many companies today are developing business applications in cloud containers unknown to support staff.
A cloud research firm reported that breaches related to cloud misconfigurations in 2018 and 2019 exposed nearly 33.4 billion records in total.
On-premises server farms within the data center are either underutilized or unmanaged on the network.
In many cases, access to sensitive data is not secured properly, or there are blind spots in determining the data owner to resolve security issues.
These are a few problems when it comes to data protection and the cloud transformation facing many organizations today.
Policies To Consider When Developing A Security Strategy
An important element of an effective security strategy is the information security policy.
Security policies are a set of written practices and procedures that all employees must follow to ensure the confidentiality, integrity, and availability of data and resources.
The security policy provides what the expectations are for the business, how they are to be achieved, and describes the consequences for failure with the goal of protecting the organization.
In addition to a single Information Security Policy, many organizations opt to have specific policies instead of one large policy.
Breaking out the policies into smaller policies make it friendlier for the end user to digest.
Below are sample policies that can be written in addition to the main security policy.
These are a general set of security policy templates that set of standardized practices and procedures that outlines rules of network access, the architecture of the network, and security environments, as well as determine how policies are enforced.
Data security policies are formal documents that describe an organization’s data security goals and specific data security controls an organization has decided to put in place.
Data security policies may include different types of security controls depending on the business model and specific threats being mitigated.
General security (use an antivirus, lock unattended, password usage, patching).
- Acceptable/unacceptable Internet browsing and use
- Acceptable/unacceptable email use
- Acceptable/unacceptable usage of social networking
- Electronic file transfer of confidential information
Describes reasons for a clean, uncluttered desk that may have sensitive notes laying on a desk or taped to monitors.
Remote Access Policy
- Definition of remote access
- Who is permitted (employees/vendors)
- Types of permitted devices/operating systems
- Methods permitted (SLVPN, site-to-site VPN)
Steps To Creating A Cybersecurity Plan
There is no one size fits all approach when creating a cybersecurity strategy as every business need is unique.
In this section, we walk through 8 steps that your organization can use as a model to develop and implement a successful security strategy.
Step 1: Conduct A Security Risk Assessment
An IT enterprise security risk assessment is performed for organizations to assess, identify, and modify their overall security posture.
The risk assessment will require collaboration from multiple groups and data owners.
This process is required to obtain organizational management’s commitment to allocate resources and implement the appropriate security solutions.
A comprehensive enterprise security risk assessment also helps determine the value of the various types of data generated and stored across the organization.
Without valuing the various types of data in the organization, it is nearly impossible to prioritize and allocate technology resources where they are needed the most.
To accurately assess risk, management must identify the data sources that are most valuable to the organization, where the storage is located, and their associated vulnerabilities.
A list of areas that are sources for the assessment are listed below:
Identify Assets
Leverage your current asset tracking systems (A repository containing all assets, i.e., workstations, laptops, operating systems, servers, corporate owned mobile devices).
Determine Your Data Classifications
- Public – Any data you publicly share such as website content, publicly available financial information, or any other information that would not impact the business negatively by being breached.
- Confidential – Data that should not be shared with the public. Confidential data may be used with 3rd parties or in limited cases made available to external legal entities, but would require a Non-Disclosure Agreement (NDA) or other protections to prevent the data being accessed by the public.
- Internal Use Only – Similar to Confidential data, but which should not or cannot be shared with 3rd parties.
- Intellectual Property – Data that is critical to the core business and would damage the company’s competitiveness were it to be breached.
- Compliance Restricted Data – This is data that is required to be strictly controlled. Access to, and storage of this information must comply with the framework it falls under such as CMMC, HIPAA, HITRUST, NIST.
Map Your Assets
- Software – Maintain a repository for authorized corporate software.
- Systems – Leverage a Central Management Database (CMDB) for asset mapping back to a system or asset owner.
- Users – Catalog users into groups via role assignments, i.e., Active Directory.
- Identity – Ensure and regularly track user assignments to an asset/resource based on their current role or function.
Identify Your Threat Landscape
- Assets + Vendors – Work with Legal teams to identify contracts with 3rd parties, including NDA’s or BAA list of business provides healthcare.
- External vs internal infrastructure – Identify all network egress and ingress points
- Map where environments connect – Ensure network diagrams are available and up to date. If conducting business in the cloud, ensure infrastructure diagrams are available as well.
Prioritize Risks
- Perform a Business Impact Analysis (BIA) to identify critical systems and data owners.
- Create and maintain a risk register to identify systems or assets that pose the highest risk to the Confidentiality, Integrity, and Availability of the organization’s business systems.
Reduce Your Business's Attack Surface
Step 2: Set Your Security Goals
A key component of the cybersecurity strategy is to ensure that it aligns or is in step with the business goals of the company.
Once the business goals are established, the implementation of a proactive cybersecurity program for the entire organization can commence.
This section identifies various areas that can assist in creating the security goals.
Determine Your Security Maturity
- Perform Assessment Of Your Security Program – Review architecture, past and recent logged incidents, breaches, and review performance of Identity, Access, and Management system.
- Determine Status Of Metrics – Review Service Level Agreements (SLA’s) or Key Performance Indicators (KPI’s).
- Benchmark Current State – Use a self-assessment tool that measures the maturity of the organization’s cybersecurity capabilities in a consistent manner.
Understand Your Company’s Risk Appetite
Output from a risk register and impact analysis will help determine how and where cybersecurity should be prioritized.
Set Reasonable Expectations
- Resources – Does expertise exist to meet the cyber strategic goals? Does the budget exist to hire Managed Security Services Provider (MSSP)?
- Timelines – Set milestones for each strategic goal and regularly communicate status to stakeholders.
- Budget – Carefully review results of the cybersecurity risk assessment. The budget depends on the outcome of the assessment and determines if additional systems should be acquired to lower or mitigate risk.
- Ability to execute – Once expectations are known, review the state of resources to determine capability to make it happen.
Handle Low Hanging Fruit Immediately
The term ‘Low hanging fruit is a business metaphor that refers to tasks that are simple and easily attainable, i.e., a quick win.
If executed in a timely manner, this will provide and exude confidence that you will continue to attain strategic goals as you address the more difficult challenges.
Step 3: Evaluate Your Technology
Another key component of the cybersecurity strategy is the evaluation of technology.
Once the assets have been identified, the next step(s) are to determine if these systems meet security best practices, understand how they function on the network, and who supports the technology within the business.
The items below will assist with the gathering of the information in this key area of the security strategy roadmap.
What Is Currently In Use?
Identify the current state of asset Operating Systems.
With End-of-Life technology, patches, bug fixes and security upgrades automatically stop.
As a result, your product security is at risk if there are business applications running on these systems and could potentially lead to compromise.
Are There Sufficient Resources To Manage These Platforms?
As listed in Step 2 of the plan, the expertise to support the technical platforms is critical.
Resources are required to patch these systems.
In the event of a zero-day attack, resources must be available and responsive to mitigate the threat, as well as recover from an incident.
Does Technology Bloat Exist?
Technical bloat is a known problem for large enterprise environments that have systems that perform duplicate services.
Poorly written code by developers may lead to ‘technical debt’ – basically, it will cost more, in the end, to rework and document the code properly compared to the initial release.
Unapproved installation of software can cause issues as well.
These systems are usually created by independent teams without the involvement of the support staff. This practice is referred to as Shadow IT.
How Does Data Flow In And Out Of Your Systems Because Of Using This Technology?
Documentation is essential to identifying security weaknesses in technology.
Best practices should be implemented with security engaged during the lifecycle of application development to production release.
Step 4: Select A Security Framework
There are multiple frameworks available today that can help you create and support the cybersecurity strategy; however, you can’t secure what you can’t see.
The results of the cybersecurity risk assessment, vulnerability assessment, and penetration test can help you determine which framework to select.
The security framework will provide guidance on the controls needed to continuously monitor and measure the security posture of your organization.
The items below can assist in the selection of a security framework.
Determine Your Current Security Maturity
Leverage the output from the results gathered in Step 2 related to the maturity model.
Identify What You’re Legally Required To Protect
Depending on the vertical or sector of your organization, certain regulations exist that must be adhered to or be subject to stiff penalties, i.e., HIPAA, SOX, PCI, or GDPR.
There are frameworks that address a specific regulatory requirement of your organization.
Choose a framework that is feasible and aligns with your company’s strategic business goals.
Once an understanding of the requirements of the business are known, you can then begin the selection process for a framework:
- PCI-DSS for consumer credit card industry
- CMMC for DoD suppliers
- NIST for healthcare
- CIS top 18 for SMBs
Step 5: Review Security Policies
The goal of security policies is to address security threats and implement cybersecurity strategies.
An organization may have one overarching security policy, along with specific sub policies to address various technologies in place at the organization.
To ensure security policies are up to date and address emerging threats, a thorough review of the policies is recommended.
Below are steps that can help you review the state of your security policies.
What Policies Are In Use Today?
A periodic review of the current policies should be conducted to ensure they align with the business model.
Are These Policies Enforced Or Just Written?
The policies should be enforceable.
Each person in the organization is accountable to how they adhere to the security policies.
The policies should be readily available for employees to view.
The policies should be mapped to security controls that monitors, logs, or prevents an activity that is documented in the policy.
Train Employees In Security Principles
Security awareness training is essential because it can be used to enforce security policies.
There are multiple options to achieve this goal:
- Select a platform that manages real time phishing campaigns through corporate email and provides immediate feedback to senior management.
- Invest in security awareness training applications
- Hire guest speakers to keep security education interesting, i.e., lunch and learns or annual awareness events.
Step 6: Create A Risk Management Plan
Creating a risk management plan is an essential component of the cybersecurity strategy.
This plan provides an analysis of potential risks that may impact the organization.
This proactive approach makes it possible for the business to identify and analyze risk that could potentially adversely the business before they occur.
The following policies below are examples of best practice policies that can be incorporated into your risk management plan.
- Data Privacy Policy – Provides governance around the handling of corporate data is handled and secured properly.
- Retention Policy – Describes how various types of corporate data should be stored or archived, where, and for how long.
- Data Protection Policy – This policy states how the business handles the personal data of its employees, customers, suppliers, and other third parties.
- Incident Response Plan – This plan outlines the responsibilities and procedures that should be followed to ensure a quick, effective and orderly response to Security Incidents.
Step 7: Implement Your Security Strategy
At this stage of the strategy, assessments are near completion along with policy plans.
It is now time to prioritize remediation efforts and assign tasks to teams.
Assign remediation items by priority to internal teams.
If your organization has a Project Management office, enlist this team to manage the project.
If there isn’t a project team available, provide leadership and work with the internal teams and plan the efforts.
Set realistic remediation deadline goals
Setting deadlines that are too aggressive and unrealistic is a recipe for disaster.
Better to set a reasonable time frame and exceed expectations.
Step 8: Evaluate Your Security Strategy
This final step in the creation of the cybersecurity strategy is the start of an ongoing support of the security strategy.
Threat actors will continue to exploit vulnerabilities regardless of the size of the organization.
It is imperative that the security strategy be monitored and tested regularly to ensure the goals of the strategy align with the threat landscape.
The items below are key points to consider maintaining a continuous and comprehensive oversight.
Establish A Board Of Key Stakeholders Throughout The Organization
Stakeholders are critical to the success of the security strategy.
This group provides resources and ongoing support for the project and is accountable for enabling success.
Conduct Annual Risk Assessment
The goals of the security strategy typically do not change very often, since they should align closely with the goals of the business, however, the threat landscape changes quite often.
It is imperative that the strategy be revisited to determine if any gaps exist in the program. An annual review is a general accepted review period.
Obtain Feedback From Internal And External Stakeholder’s
When stakeholders understand that you are making strategic decisions about the security of the business, they will accept and appreciate your actions.
The information you receive from internal and external stakeholders will help justify security budgets, processes, and overall business strategies.
Common Pitfalls To Avoid When Implementing Your Cybersecurity Strategy
The success of the cybersecurity strategy relies on careful planning with buy in from executive management.
Without leadership support, the strategy will falter and will ultimately fail.
Leadership from the senior team is the most significant factor in the success of the cybersecurity strategy.
There are pitfalls or roadblocks that may still be in the path that need to be recognized, avoided, or mitigated.
Technology Sprawl And Lack Of Documentation
Over time, new servers and applications are provisioned to accommodate a business requirement or development testing.
If there is a lack of change management and decommissioning processes, these systems may spread out and remain on the network indefinitely.
These systems may remain unpatched or can become sources of backdoors.
Legacy Systems
Legacy system that cannot be patched or no longer supported is a high risk.
Lack of continuous monitoring of the cybersecurity plan or weak application security management is a byproduct of this pitfall.
Insufficient Resources
When it comes to cybersecurity, time and the utilization of resources is what companies struggle with the most.
Many SMBs are lean on staff and one person wears all the hats.
It may be work, but failure to patched equipment leaves vulnerabilities in the network that may remain unmitigated for months or years.
Partnering with a Managed Security Provider can address this pitfall.
Frequently Asked Questions
What Should A Cyber Securitystrategy Include?
A cybersecurity strategy should include an objective that aligns with the goals of the business.
Once the objective is clear, various resources of information are needed to build out the strategy to establish the current state of the program.
The current state will identify risks and weaknesses within the organization. The strategy will provide the security controls and recommendations to remediate and reduce risk.
What Is a Cybersecurity Roadmap?
A cybersecurity roadmap is a strategic, risk-based approach plan.
The goal of a plan is to create a guide that includes an assessment of the current state of the program.
Once the current state is identified, the roadmap will include multiple strategic milestones designed to help the business monitor and immediately identify gaps in security controls within the environment.
What Is a Cybersecurity Framework?
The framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk.
In addition to helping organizations manage and reduce risks, it is designed to encourage risk and cybersecurity management communications to both internal and external organizational stakeholders.
Who Is Responsible For Your Business’s Security Strategy?
Any strategy that addresses risk to the business starts at the top of the organization.
Leadership and IT teams do take responsibility for creating and deploying a strategy.
Employees also contribute to the strategy, but ultimately, the responsibility starts at the top of the organization.
How Long Does It Take to Prepare a Cybersecurity Strategy?
The length of time it takes to prepare a cybersecurity strategy can vary from one organization to the next.
There isn’t a set time frame that fits all organizations, however, the plan should be treated as a project with milestones based on resources, risk assessment reviews, technology, and other factors related to the project.
How Do You Prepare Your Cybersecurity Strategy?
Preparation of the cybersecurity strategy starts with engaging all relevant stakeholders.
This communication will provide insight on the business goals and requirements to secure.
At this point, a roadmap strategy can be developed utilizing the 8 steps listed earlier in this article.
How Often Should You Evaluate Your Cybersecurity Strategy?
A typical time frame to evaluate a cybersecurity strategy at a minimum is annually.
However, the cybersecurity strategy may be re-evaluated sooner in case there is a security breach, company acquisitions, or change in business model.
How Much Does a Cybersecurity Strategy Cost to Develop & Implement?
The cost of developing and implementing a cybersecurity strategy has many dependencies. One dependency is resource availability.
Expertise will be needed to conduct risk assessments; however, the organization may not have internal resources to conduct the review.
The same principle applies to vulnerability and penetration testing, this level of testing is usually performed by a third-party company specializing in this area.
Organizations can expect to spend between $15,000 – $100,000+ for a cyber security strategy to be developed.
Implementation can range from tens of thousands to hundreds of thousands of dollars over a period of 2-3 years.
How Can Small Businesses Improve Their Cybersecurity?
Smaller businesses may be more prone to cyberattacks as they typically have fewer resources dedicated to cybersecurity.
However, there are a few simple, cost-effective practices to keeping data and devices secure without breaking the bank.
- Educate employees
- Multifactor identification
- Implement strong passwords
- Install Up-to-Date Antivirus Software
- Back up your data regularly