Welcome! This worksheet is provided for Rational Cybersecurity for Business readers. Readers can apply the book’s guidance to align their cybersecurity programs or projects with the business. Please copy the worksheet from this page into your text editing tool or DOWNLOAD AND FILL OUT OR PRINT THE INTERACTIVE PDF to begin capturing your information. 

Rational Cybersecurity for Business 

Instructions: Chapters 1-9 in the book each contain instructions for completing a part of the worksheet. Chapter 10 provides complete instructions for the entire worksheet.

 

 ENTER DATE FOR STARTING YOUR WORKSHEET RESPONSES:

 

 

1.    Scope out Your Priority Focus Areas

 

Priority Focus Area

Check box if priority

Develop and Govern a Healthy Security Culture

 

Manage Risk in the Language Business

 

Establish a Control Baseline

 

Simplify and Rationalize IT & Security

 

Control Access with Minimal Drag on the Business

 

Institute Resilient Detection, Response, and Recovery

 

Table 1: Focus Priorities from Rational Cybersecurity for the Business

 

2.    Identity Stakeholders

Fill in the name of the person holding each role identified in Table 2. If a role doesn’t exist or is called something else at your organization then remove, edit, or annotate the row. In the Contact Plan column, note whether the person should be contacted now or later, and who will be the relationship manager. Fill in the Notes column with any known projects, issues, or pain points to cover with the stakeholder. 

Security-Related Role

Stakeholder Name

Contact Plan

Notes (Projects, Issues, Pain Points)

Board of Directors

 

 

 

CEO, business sponsor

 

 

 

Chief Counsel (Legal)

 

 

 

Chief Digital Officer

 

 

 

CIO

 

 

 

CISO

 

 

 

Chief Privacy Officer

 

 

 

Chief Risk Officer

 

 

 

Chief Technology Officer

 

 

 

Compliance and Audit

 

 

 

Enterprise Architecture (EA)

 

 

 

Human resources (HR)

 

 

 

IAM team manager

 

 

 

IT operations

 

 

 

LOB executives

 

 

 

Security incident response

 

 

 

Security Ops manager

 

 

 

Service manager

 

 

 

3rd party risk manager

 

 

 

Business continuity manager

 

 

 

Table 2: Stakeholder Engagement Tracking Table

 

3.    Make a Quick Assessment of Current State

For each of the Priority Focus Areas in the Table 3 below, review the sample quick assessment criteria in Chapter 10 or in Chapters 3 through 9. Base your scores on whether you would answer most of the questions with a strong “no” (1), a strong “yes” (5), or something in between.

Response Score Criteria: 1 (strongly disagree), 2 (disagree), 3 (neutral), 4 (agree), 5 (strongly agree)

Priority Focus Area

Today

Score (1-5)

+ 3 months

Score (1-5)

+ 6 months

Score (1-5)

Develop and Govern a Strong Security Culture

 

 

 

Manage Risk in the Language Business

 

 

 

Establish a Control Baseline

 

 

 

Simplify and Rationalize IT & Security

 

 

 

Control Access with Minimal Drag on the Business

 

 

 

Institute Resilient Detection and Response

 

 

 

Table 3: Security Leaders Quick Assessment of Current State of Priority Focus Areas in the Business at 3 Points in Time

 

Optionally, record any notes on your ratings from Table 3 in the Table below.

Priority Focus Area

Optional Notes

Develop and Govern a Strong Security Culture

 

Manage Risk in the Language Business

 

Establish a Control Baseline

 

Simplify and Rationalize IT & Security

 

Control Access with Minimal Drag on the Business

 

Institute Resilient Detection and Response

 

Table 4: Optional Notes on Current State Rating

 

4.    Identify Improvement Objectives

If you have selected “Develop and Govern a Strong Security Culture” as one of your Priority Focus areas, enter improvement objectives into table 5. Because this topic crosses two chapters, two Table 5’s (5a and 5b) are provided for security governance and security culture respectively.

Security Governance Improvement Objective

Optional Notes

Status

Increase CISO and security team communication with stakeholders

This is an example. Use it or replace it with your own improvement objectives.

Document date completed, any results.

 

 

 

 

 

 

Table 5a: Improvement Objectives for Security Governance

 

Security Culture Improvement Objective

Optional Notes

Status

 

 

 

 

 

 

 

 

 

 Table 5b: Improvement Objectives for Security Culture

 

If you have selected “Manage Risk in the Language Business” as one of your Priority Focus areas, enter improvement objectives into Table 6.

 

Risk Management Improvement Objective

Optional Notes

Status

 

 

 

 

 

 

 

 

 

Table 6: Improvement Objectives for “Manage Risk in the Language of Business

 

If you have selected “Establish a Control Baseline” as one of your Priority Focus areas, enter improvement objectives into Table 7.

 

Control Baseline Improvement Objective

Optional Notes

Status

 

 

 

 

 

 

 

 

 

Table 7: Improvement Objectives for “Establish a Control Baseline

 

If you have selected “Simplify and Rationalize IT & Security” as one of your Priority Focus areas, enter improvement objectives into Table 8.

IT Security Simplification Improvement Objective

Optional Notes

Status

 

 

 

 

 

 

 

 

 

Table 8: Improvement Objectives for “Simplify and Rationalize IT & Security”

 

If you have selected “Control Access with Minimal Drag on the Business” as one of your Priority Focus areas, enter improvement objectives into Table 9.

Access Governance Improvement Objective

Optional Notes

Status

 

 

 

 

 

 

 

 

 

Table 9: Improvement Objectives for “Control Access with Minimal Drag on the Business”

 

If you have selected “Institute Resilience through Detection, Response, and Recovery” as one of your Priority Focus areas, enter improvement objectives into Table 10.

 

Improvement Objective

Optional Notes

Status

 

 

 

 

 

 

 

 

 

Table 10: Improvement Objectives for “Institute Resilient Detection, Response, and Recovery

 

For each of your priority focus areas and improvement objectives, define a metric you can track over the next 30 – 90 days. A few examples are included.   

 

5.    Specify Metrics and Track Progress

Use Table 11 to specify metrics for improvement objectives that require recurring activities or processes. Then track improvement objective results against the metrics in the table. Also, remember to go back to Section 3, Tables 3 and 4 to update the Current State Assessment as your cybersecurity-business alignment and security program improve.

Priority Focus Area / Improvement Objective

Metric

Metric results

 

 

Develop and Govern a Strong Security Culture

 

at 30 days

at 60 days

at 90 days

Increase CISO and security team communication with stakeholders

#Stakeholder 1 on 1 meetings

3

6

11

 

#Stakeholder team briefings

 

 

 

Improvement objective #2

Metric #1

 

 

 

  

Metric #2

 

 

 

Improvement objective #3 

Metric #1

 

 

 

  

Metric #2

 

 

 

Manage Risk in the Language of Business

Metric

at 30 days

at 60 days

at 90 days

Improvement objective #1

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #2

Metric #1

 

 

 

  

Metric #2

 

 

 

Improvement objective #3 

Metric #1

 

 

 

  

Metric #2

 

 

 

Establish a Control Baseline 

Metric

at 30 days

at 60 days

at 90 days

Improvement objective #1

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #2

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #3

Metric #1

 

 

 

 

Metric #2

 

 

 

Simplify and Rationalize IT & Security 

Metric

at 30 days

at 60 days

at 90 days

Improvement objective #1

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #2

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #3

Metric #1

 

 

 

 

Metric #2

 

 

 

Control Access with Minimal Drag on the Business

Metric

at 30 days

at 60 days

at 90 days

Improvement objective #1

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #2

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #3

Metric #1

 

 

 

 

Metric #2

 

 

 

Institute Resilient Detection and Response

Metric

at 30 days

at 60 days

at 90 days

Improvement objective #1

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #2

Metric #1

 

 

 

 

Metric #2

 

 

 

Improvement objective #3

Metric #1

 

 

 

 

Metric #2

 

 

 

Table 11: Track Metrics for Improvement Objectives