Tactics without strategy is the noise before defeat.
- Sun Tzu
As a leader in your organization, you probably know at least two things about cybersecurity:
You may be familiar with the concept of a cybersecurity program as a way to address these challenges, and may even have one of your own in the works.
A well-designed security program is much more than a collection of policies and tools. It’s about understanding what is truly important to the business and creating a security culture across your organization.
A security program is a tactically-oriented set of policies, procedures, and technology that allow for an organization to protect the confidentiality, integrity, and availability of its data. Such a program also includes an appropriate governance structure as well as the organization’s culture when it comes to security.
Let’s dive into each of these facets:
Ensuring the proper level of oversight and engagement for your security program is vital to making it successful. While the saying “security is everyone’s responsibility” sends a constructive message, it is still important to identify clearly who is responsible for what tasks when it comes to protecting the business’s data.
A well-structured governance system will describe:
Identifying the correct people within the organization to own and implement your program is absolutely vital. And your security strategy will help you determine the appropriate stakeholders.
Policies are written expressions of a company’s stance on specific security topics. Generally written at a high level without focus on specific tools or techniques, policies clearly define the business’s objectives and requirements when it comes to things like:
In addition to providing clear direction to everyone in the organization as to its goals and standards of acceptable behavior, policies are required by an array of compliance frameworks such as the NIST Cybersecurity Framework (CSF) and SOC 2. Your security strategy, however, will drive how you draft your policies and what frameworks you pursue.
At a more granular level, procedures explain to individual team members how to accomplish specific tasks in line with the company’s policies. They may explain how to do things like:
Security procedures are step-by-step playbooks and checklists that allow individual contributors to accomplish discrete tasks. Ensuring procedures align with your policies and, ultimately, your security strategy, is key.
Cybersecurity is a relatively technical discipline that requires specialized software in many cases. With that said, it’s important to not get wrapped around the axle when analyzing different products and services offerings. More than ever, the unique security needs of companies vary by their size, industry, IT infrastructure, technical resources, and budget.
Some common tools that most organizations should consider, include:
The exact number, type, and sophistication of the tools you use, though, will depend heavily on the threats you face and the resources available to you. Addressing these issues are a key component of a security strategy.
The effectiveness of a business’s cybersecurity program depends on more than just written documents and IT and security tools. Organizations must ensure that employees understand how cybersecurity contributes to organizational success and that stakeholders and individual contributors are prepared to fulfill their respective roles.
How well a business weathers the security challenges facing it depends heavily on things like:
While it's relatively easy to document cybersecurity requirements for employees and contractors, ensuring their consistent compliance is a challenge. Fostering a strong cybersecurity culture is critical for an effective cybersecurity program, which requires a well-developed cybersecurity strategy.
While a cybersecurity program is absolutely necessary for any modern business, it is by no means sufficient. It is generally difficult to provide such a program “in-a-box” (i.e. ready to implement immediately) for a generic company. That is because the business context in which a program operates must drive its design.
In our next post, we’ll dive deeper into where security programs run into challenges and how to avoid common pitfalls.