STRATEGY PLANNING SOFTWARE
Data Security Scorecard
How to create a comprehensive
cybersecurity strategy
measurable by KPIs
STRATEGY PLANNING SOFTWARE
Data Security vs. Data Privacy
Data/Information Security
Maintaining secure architecture to manage data
Data Protection
The ethical and legal use of data
Cybersecurity Security Strategy
STRATEGY PLANNING SOFTWARE
How Does Cybersecurity Strategy Help?
Base for the discussion:
justify cybersecurity
budgets
Align cybersecurity
initiatives to other parts
of the strategy
Convert some vague
ideas into something
more tangible
STRATEGY PLANNING SOFTWARE
Will the Cybersecurity Strategy Prevent Data Breaches?
Most of the data breaches are caused by known
factors like:
● Compromised credentials (19%)
● Phishing (14%)
● Cloud misconfiguration (19%)
While we cannot prevent all data
breaches, the data shows that we
can minimize their impact on the
organization
Reports for reference:
● Cost of Data Breach Report by IBM
● Verizon’s Data Breach Investigations Report
● EY Global Information Security Survey
● FireEye M-TRENDS Report
STRATEGY PLANNING SOFTWARE
Outcomes and Drivers of Cybersecurity Strategy
● Implement security automation
● Have a response team and response plan
ready
● Educate employees
● Test business environment
Expected
outcomes
Drivers
● [Stakeholders] Reduce potential financial
damage from data breach
● [Customers] Mitigate data security and data
protection risks
* Access Cybersecurity Strategy template under the BSC Designer free plan
STRATEGY PLANNING SOFTWARE
Stakeholder’s Interests
Cybersecurity Strategy Map
STRATEGY PLANNING SOFTWARE
Customers
Cybersecurity Strategy Map
STRATEGY PLANNING SOFTWARE
Weighted Risk Index
STRATEGY PLANNING SOFTWARE
Binary Indicators for Readiness Index
STRATEGY PLANNING SOFTWARE
Internal Perspective
Cybersecurity Strategy Map
STRATEGY PLANNING SOFTWARE
Weighted Index of Data Security Complexity
STRATEGY PLANNING SOFTWARE
Learning and Growth Perspective
Cybersecurity Strategy Map
STRATEGY PLANNING SOFTWARE
Rationale: Analyze Cybersecurity Risks
Cybersecurity Strategy Map
STRATEGY PLANNING SOFTWARE
Learning and Growth Perspective
Cybersecurity Strategy Map
STRATEGY PLANNING SOFTWARE
Conclusions
There are known risk factors of data
breach
There are proven ways to minimize the
impact of security incidents
Focus cybersecurity strategy on
detecting problems early and
responding fast
● Have a risk mitigation plan and response team
● Reduce bad complexities of IT systems
● Update risk models regularly
● Test your security environment
● Educate your team, as the human factor is one of
the key risks
To decrease the impact of data breaches…
What’s next?

Cybersecurity Strategy: Building a Balanced Scorecard with Effective KPIs

  • 1.
    STRATEGY PLANNING SOFTWARE DataSecurity Scorecard How to create a comprehensive cybersecurity strategy measurable by KPIs
  • 2.
    STRATEGY PLANNING SOFTWARE DataSecurity vs. Data Privacy Data/Information Security Maintaining secure architecture to manage data Data Protection The ethical and legal use of data Cybersecurity Security Strategy
  • 3.
    STRATEGY PLANNING SOFTWARE HowDoes Cybersecurity Strategy Help? Base for the discussion: justify cybersecurity budgets Align cybersecurity initiatives to other parts of the strategy Convert some vague ideas into something more tangible
  • 4.
    STRATEGY PLANNING SOFTWARE Willthe Cybersecurity Strategy Prevent Data Breaches? Most of the data breaches are caused by known factors like: ● Compromised credentials (19%) ● Phishing (14%) ● Cloud misconfiguration (19%) While we cannot prevent all data breaches, the data shows that we can minimize their impact on the organization Reports for reference: ● Cost of Data Breach Report by IBM ● Verizon’s Data Breach Investigations Report ● EY Global Information Security Survey ● FireEye M-TRENDS Report
  • 5.
    STRATEGY PLANNING SOFTWARE Outcomesand Drivers of Cybersecurity Strategy ● Implement security automation ● Have a response team and response plan ready ● Educate employees ● Test business environment Expected outcomes Drivers ● [Stakeholders] Reduce potential financial damage from data breach ● [Customers] Mitigate data security and data protection risks * Access Cybersecurity Strategy template under the BSC Designer free plan
  • 6.
    STRATEGY PLANNING SOFTWARE Stakeholder’sInterests Cybersecurity Strategy Map
  • 7.
  • 8.
  • 9.
    STRATEGY PLANNING SOFTWARE BinaryIndicators for Readiness Index
  • 10.
    STRATEGY PLANNING SOFTWARE InternalPerspective Cybersecurity Strategy Map
  • 11.
    STRATEGY PLANNING SOFTWARE WeightedIndex of Data Security Complexity
  • 12.
    STRATEGY PLANNING SOFTWARE Learningand Growth Perspective Cybersecurity Strategy Map
  • 13.
    STRATEGY PLANNING SOFTWARE Rationale:Analyze Cybersecurity Risks Cybersecurity Strategy Map
  • 14.
    STRATEGY PLANNING SOFTWARE Learningand Growth Perspective Cybersecurity Strategy Map
  • 15.
    STRATEGY PLANNING SOFTWARE Conclusions Thereare known risk factors of data breach There are proven ways to minimize the impact of security incidents Focus cybersecurity strategy on detecting problems early and responding fast ● Have a risk mitigation plan and response team ● Reduce bad complexities of IT systems ● Update risk models regularly ● Test your security environment ● Educate your team, as the human factor is one of the key risks To decrease the impact of data breaches… What’s next?