Blog Layout

Christian Ulmer • January 23, 2024
A No-Frills Guide to Crafting an Actionable Cyber Security Strategy for Small & Medium Businesses

Embrace the Practical: Why Tangible Beats Perfection Every Time

Cyber security strategy design and presentation often tip into overwhelm. For creators, the temptation is to pack in endless content, sources, and data points. For stakeholders and recipients, this can lead to a deluge of information that's hard to navigate. While there's no one-size-fits-all solution, there are practical tips adaptable to both small and large firms. These strategies focus on distilling complexity into clarity, ensuring your cyber security plan is not just comprehensive, but also comprehensible.


Stakeholder Identification - make the strategy relevant, speak their language


Remember, your cyber security strategy isn't crafted for you; it's for your stakeholders. This includes everyone from senior management and clients to IT staff, users, developers, and regulators. To make your strategy resonate, leverage stakeholder maps. These tools, built from structured interviews, workshops, and even casual conversations, help you understand each group's motivations and influence.


Ditch the jargon. Security lingo might be our comfort zone, but it often falls flat. Whether you're addressing the CEO, CIO, Board Chairman, application developer, legal expert, or a user frustrated by a blocked email, tailor your language. It might seem daunting, but the effort pays off. A strategy that speaks in the listener's language is a strategy that moves people to action.

Business Embedment - making cyber security a business enabler


Effective cyber security isn't just about defense; it's about enabling and protecting the business from the ground up. Too often, even the most comprehensive strategies fail to gain traction because they're crafted in isolation, detached from the business's realities. Avoid the 'ivory tower' approach. Start by understanding the key projects driving your business and how a robust security approach can accelerate these initiatives. Listen to sales and marketing teams' collaboration challenges, engage with developers and engineers to understand their workflows and tools, and offer solutions to their productivity issues and security concerns.


Resist the temptation to focus solely on potential risks. Yes, security professionals are attuned to what could go wrong, but it's equally important to highlight how security can create opportunities. Demonstrate how 'secure by design' principles can enhance products and services. Balance pragmatism with firmness. Recognize the pressures of time-to-market and budget constraints, but also clearly define and communicate your non-negotiables. Be ready to stand your ground, ensuring that security is not just a policy but a fundamental business pillar.


Regulatory Insight - navigating the compliance landscape in cyber security


Dealing with regulations and compliance in cyber security is a balancing act. On one side, the regulatory environment helps shape your strategy, particularly its governance aspect. On the other, it often entails extensive documentation that might not directly contribute to reducing security risks.


A common misperception is that adhering to policies, frameworks, and certifications is sufficient for robust security. This is far from the truth. While these elements are crucial, they are just part of the puzzle. Understanding the boundaries and limitations of your strategy within the regulatory framework is essential. Compliance should be viewed not as the end goal, but as a baseline from which to build a more comprehensive and effective cyber security strategy.

Attack Surface Analysis - identifying what is truly at risk


Attack Surface Analysis, traditionally a tool for Cyber Defense teams, can be a game-changer for broader strategy development. It's about understanding what needs protection – and what doesn't. This approach isn't just about defense; it's a crucial step in prioritization and feeds directly into risk management and issue resolution. Begin by examining the markets your company operates in, including geographic regions and business domains. Assess the threat landscape: Are you a prime target, or are opportunistic attacks more likely? Look into indications of planned attacks against your company, perhaps lurking in the dark corners of the web.


Employ a range of tools for a thorough assessment. This includes digital risk monitoring, resilience scans, penetration tests, phishing simulations, and commercial benchmarks. These tools help evaluate the robustness of your perimeters and the preparedness of your users. An often overlooked aspect is your supply chain. If your suppliers are vulnerable, so are you. Integrating them into your attack surface analysis is crucial for a holistic security strategy.

Creative Security - think outside the box


Thinking outside the box is key in developing an effective cyber security strategy. Take a close look at your company's existing methods, tools, frameworks, and processes, and find ways to integrate them into your security approach. If your company adopts agile methodologies for projects, apply the same principles to your security projects. Utilize agile tools like 'definition of done', 'minimum viable product', sprints, stand-ups, and show-and-tell sessions.


Explore internal resources such as low-code automation expertise. This can be a game-changer for streamlining security processes, reducing the overhead of tasks like control assessments or reporting.


Another powerful approach is employing Design Thinking or Use Case Thinking. These methods help in identifying specific scenarios where security can add tangible value to the business. For example, addressing collaboration challenges securely. Use Design Thinking not just to identify these opportunities but also to solve complex problems and validate innovative ideas. This approach ensures that security measures are not just about protection but also about enabling and enhancing business operations.

Risk Assessment & Management - timing is everything


Placing Risk Assessment and Management later in the strategy might raise eyebrows, but there's a method to the madness. As a staunch advocate for thorough risk assessment and management in cyber security, I believe its effectiveness hinges on the maturity of a company's risk culture. In environments where acknowledged risks don't translate into financial planning for potential setbacks, even the best risk treatment plans are deemed too costly.


The key is not just conducting risk assessments but doing so in a context where their implications are understood and acted upon. This requires a company culture that not only identifies and assesses risks but also allocates resources to mitigate them. Without this mature approach, risk management efforts can fall short, regardless of their inherent quality.

People & Delivery - nurturing your team through strategic change


As you develop your cyber security strategy, consider its impact on your team. Managing change and transformation is pivotal. Assess the skills present within your team and identify any gaps. Equally important is recognizing which skills may become obsolete. Focus on enabling and developing your team to adapt to new challenges and roles.


Understanding your company's sourcing strategy is also crucial. Determine which services and capabilities should be retained in-house versus those that can be outsourced or consumed as a service. This decision is not just about cost-efficiency but also about maintaining control over critical aspects of your cyber security posture while leveraging external expertise where beneficial. Balancing these elements is key to a strategy that is not only robust but also realistic and sustainable in terms of human resources.

Share by: