Welcome! This worksheet is provided for Rational Cybersecurity for Business readers. Readers can apply the book’s guidance to align their cybersecurity programs or projects with the business. Please copy the worksheet from this page into your text editing tool or DOWNLOAD AND FILL OUT OR PRINT THE INTERACTIVE PDF to begin capturing your information.

Instructions: Chapters 1-9 in the book each contain instructions for completing a part of the worksheet. Chapter 10 provides complete instructions for the entire worksheet.
ENTER DATE FOR STARTING YOUR WORKSHEET RESPONSES: |
|
1. Scope out Your Priority Focus Areas
Priority Focus Area |
Check box if priority |
Develop and Govern a Healthy Security Culture |
|
Manage Risk in the Language Business |
|
Establish a Control Baseline |
|
Simplify and Rationalize IT & Security |
|
Control Access with Minimal Drag on the Business |
|
Institute Resilient Detection, Response, and Recovery |
|
Table 1: Focus Priorities from Rational Cybersecurity for the Business
2. Identity Stakeholders
Fill in the name of the person holding each role identified in Table 2. If a role doesn’t exist or is called something else at your organization then remove, edit, or annotate the row. In the Contact Plan column, note whether the person should be contacted now or later, and who will be the relationship manager. Fill in the Notes column with any known projects, issues, or pain points to cover with the stakeholder.
Security-Related Role |
Stakeholder Name |
Contact Plan |
Notes (Projects, Issues, Pain Points) |
Board of Directors |
|
|
|
CEO, business sponsor |
|
|
|
Chief Counsel (Legal) |
|
|
|
Chief Digital Officer |
|
|
|
CIO |
|
|
|
CISO |
|
|
|
Chief Privacy Officer |
|
|
|
Chief Risk Officer |
|
|
|
Chief Technology Officer |
|
|
|
Compliance and Audit |
|
|
|
Enterprise Architecture (EA) |
|
|
|
Human resources (HR) |
|
|
|
IAM team manager |
|
|
|
IT operations |
|
|
|
LOB executives |
|
|
|
Security incident response |
|
|
|
Security Ops manager |
|
|
|
Service manager |
|
|
|
3rd party risk manager |
|
|
|
Business continuity manager |
|
|
|
Table 2: Stakeholder Engagement Tracking Table
3. Make a Quick Assessment of Current State
For each of the Priority Focus Areas in the Table 3 below, review the sample quick assessment criteria in Chapter 10 or in Chapters 3 through 9. Base your scores on whether you would answer most of the questions with a strong “no” (1), a strong “yes” (5), or something in between.
Response Score Criteria: 1 (strongly disagree), 2 (disagree), 3 (neutral), 4 (agree), 5 (strongly agree)
Priority Focus Area |
Today Score (1-5) |
+ 3 months Score (1-5) |
+ 6 months Score (1-5) |
Develop and Govern a Strong Security Culture |
|
|
|
Manage Risk in the Language Business |
|
|
|
Establish a Control Baseline |
|
|
|
Simplify and Rationalize IT & Security |
|
|
|
Control Access with Minimal Drag on the Business |
|
|
|
Institute Resilient Detection and Response |
|
|
|
Table 3: Security Leaders Quick Assessment of Current State of Priority Focus Areas in the Business at 3 Points in Time
Optionally, record any notes on your ratings from Table 3 in the Table below.
Priority Focus Area |
Optional Notes |
Develop and Govern a Strong Security Culture |
|
Manage Risk in the Language Business |
|
Establish a Control Baseline |
|
Simplify and Rationalize IT & Security |
|
Control Access with Minimal Drag on the Business |
|
Institute Resilient Detection and Response |
|
Table 4: Optional Notes on Current State Rating
4. Identify Improvement Objectives
If you have selected “Develop and Govern a Strong Security Culture” as one of your Priority Focus areas, enter improvement objectives into table 5. Because this topic crosses two chapters, two Table 5’s (5a and 5b) are provided for security governance and security culture respectively.
Security Governance Improvement Objective |
Optional Notes |
Status |
Increase CISO and security team communication with stakeholders |
This is an example. Use it or replace it with your own improvement objectives. |
Document date completed, any results. |
|
|
|
|
|
|
Table 5a: Improvement Objectives for Security Governance
Security Culture Improvement Objective |
Optional Notes |
Status |
|
|
|
|
|
|
|
|
|
Table 5b: Improvement Objectives for Security Culture
If you have selected “Manage Risk in the Language Business” as one of your Priority Focus areas, enter improvement objectives into Table 6.
Risk Management Improvement Objective |
Optional Notes |
Status |
|
|
|
|
|
|
|
|
|
Table 6: Improvement Objectives for “Manage Risk in the Language of Business”
If you have selected “Establish a Control Baseline” as one of your Priority Focus areas, enter improvement objectives into Table 7.
Control Baseline Improvement Objective |
Optional Notes |
Status |
|
|
|
|
|
|
|
|
|
Table 7: Improvement Objectives for “Establish a Control Baseline”
If you have selected “Simplify and Rationalize IT & Security” as one of your Priority Focus areas, enter improvement objectives into Table 8.
IT Security Simplification Improvement Objective |
Optional Notes |
Status |
|
|
|
|
|
|
|
|
|
Table 8: Improvement Objectives for “Simplify and Rationalize IT & Security”
If you have selected “Control Access with Minimal Drag on the Business” as one of your Priority Focus areas, enter improvement objectives into Table 9.
Access Governance Improvement Objective |
Optional Notes |
Status |
|
|
|
|
|
|
|
|
|
Table 9: Improvement Objectives for “Control Access with Minimal Drag on the Business”
If you have selected “Institute Resilience through Detection, Response, and Recovery” as one of your Priority Focus areas, enter improvement objectives into Table 10.
Improvement Objective |
Optional Notes |
Status |
|
|
|
|
|
|
|
|
|
Table 10: Improvement Objectives for “Institute Resilient Detection, Response, and Recovery”
For each of your priority focus areas and improvement objectives, define a metric you can track over the next 30 – 90 days. A few examples are included.
5. Specify Metrics and Track Progress
Use Table 11 to specify metrics for improvement objectives that require recurring activities or processes. Then track improvement objective results against the metrics in the table. Also, remember to go back to Section 3, Tables 3 and 4 to update the Current State Assessment as your cybersecurity-business alignment and security program improve.
Priority Focus Area / Improvement Objective |
Metric |
Metric results |
|
|
Develop and Govern a Strong Security Culture |
|
at 30 days |
at 60 days |
at 90 days |
Increase CISO and security team communication with stakeholders |
#Stakeholder 1 on 1 meetings |
3 |
6 |
11 |
|
#Stakeholder team briefings |
|
|
|
Improvement objective #2 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #3 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Manage Risk in the Language of Business |
Metric |
at 30 days |
at 60 days |
at 90 days |
Improvement objective #1 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #2 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #3 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Establish a Control Baseline |
Metric |
at 30 days |
at 60 days |
at 90 days |
Improvement objective #1 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #2 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #3 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Simplify and Rationalize IT & Security |
Metric |
at 30 days |
at 60 days |
at 90 days |
Improvement objective #1 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #2 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #3 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Control Access with Minimal Drag on the Business |
Metric |
at 30 days |
at 60 days |
at 90 days |
Improvement objective #1 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #2 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #3 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Institute Resilient Detection and Response |
Metric |
at 30 days |
at 60 days |
at 90 days |
Improvement objective #1 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #2 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Improvement objective #3 |
Metric #1 |
|
|
|
|
Metric #2 |
|
|
|
Table 11: Track Metrics for Improvement Objectives