While business processes and technology are important to cybersecurity risk management, Cybint Solutions reports that “95% of cybersecurity breaches are caused by human error.”[1] Once data is lost in a breach or ransomware attack, it may be difficult to recover if an organization is not prepared. This is why a strong cybersecurity culture is important: so organizations can protect their viability, assets and data.
Most importantly, only senior leadership within an organization can drive the cybersecurity culture. They provide the strategic planning and funding to ensure a proactive compliance and risk management program. Leaders also ensure that all business personnel (employees and contractors) are responsible for protecting assets and data, or reporting potential events and incidents.
In a joint report by the Center for Medicare and Medicaid Innovation and ISACA, “In organizations that have yet to establish an effective cyberculture, 58% cite a corresponding lack of a clear management plan or key performance indicators.”[2] Most surveyed in the report believe that their organization’s weak cybersecurity culture made them more vulnerable to cyber breaches, data loss, regulatory penalties, missed business opportunities and poor customer retention.
Prior to creating a cybersecurity strategic plan, organizations typically perform internal or third-party risk assessments, vulnerability testing, penetration tests and code reviews. All of these activities occur regularly, such as monthly scans and annual testing. A senior leader can define and establish the cybersecurity goals and objectives within an information security strategic plan based on these regular tests and assessments.
The primary objectives of the plan are to protect:
- Data confidentiality
- System and data integrity
- Availability
- Nonrepudiation
- Executive Summary – Describe the comprehensive and risk-based approach to protect and support cybersecurity requirements.
- Introduction – Describe the plan’s roadmap to improving cybersecurity over the next three to five years.
- Overview – State the organization’s cybersecurity vision and mission.
- Strategic Goals – Typically goals are established after a third-party risk assessment, but this can also be done by an internal risk assessment. An example of a goal may be to decrease system vulnerabilities (such as configuration and patches).
- Objectives – List and describe how you will know that you have achieved your cybersecurity goals. For example, patch 100% of systems every 30 days with automation, and perform scans and remediate vulnerability compliance issues monthly.
- What are the security requirements that they must comply with for their roles and responsibilities? (i.e., CIS, NIST, ISO, OWASP, etc.)
- Where are the cybersecurity plans, policies, procedures and other relevant guidance located?
- Where to find the best practices for implementing security controls?
- Who are the subject matter experts within your organization?
- What is the process for making cybersecurity change management requests?
- What is the process for reporting a cybersecurity event or incident?
- How to prepare and plan for information security from the beginning of a project’s design to ensure that security is implemented and maintained throughout the lifecycle?
By Glori Euwer | 2024-07-12

