The purpose of this document is to provide companies with a step-by-step guide to developing their own pragmatic, business-specific, and agile cyber security strategy. The stages include:

  • defining the scope of assessment
  • security risk identification, analysis, evaluation, and prioritization
  • documentation of risk scenarios

 

Contents:

Management Summary

Steps Towards Solid Cyber Security

  • 1 – Map your cyber threat landscape
  • 2 – Define where you are and where you want to be in terms of cyber security maturity
  • 3 – Determine how you will reach the desired state of security maturity
  • 4 – Document your cyber security strategy
  • 5 – Focus on developing cyber culture
  • 6 – Be agile

PAC’s Recommendations

  • Recommendations for IT providers
  • Recommendations for IT users

Authors