• Home
  • Industries
    • Defense
    • Financial
    • Healthcare
  • Services
    • Advisory & Consultation
    • Policy & Plan Development
    • Risk Assessment
    • Incident Response Plans (IRP)
    • Disaster Recovery Plans & Exercises
    • Penetration Testing & Vulnerability Assessment
    • Instructor-Led Training
    • Supply Chain & Third Party Risk Management
    • V-ISO Virtual Information Security Officer
  • CMMC
    • Authorized Certification Assessment (C3PAO)
    • CMMC Readiness Assessment
    • V-ISO Virtual Information Security Officer (CMMC)
    • Instructor-Led Training (ATP)
    • CMMC Explained
  • Training
  • Catapult®
    • About Security Catapult®
    • Security Catapult® Sign Up
    • Security Catapult® Log In
  • About
    • About Us
    • The Monarch ISC Team
    • Monarch Blog
    • Events
  • Home
  • Industries
    • Defense
    • Financial
    • Healthcare
  • Services
    • Advisory & Consultation
    • Policy & Plan Development
    • Risk Assessment
    • Incident Response Plans (IRP)
    • Disaster Recovery Plans & Exercises
    • Penetration Testing & Vulnerability Assessment
    • Instructor-Led Training
    • Supply Chain & Third Party Risk Management
    • V-ISO Virtual Information Security Officer
  • CMMC
    • Authorized Certification Assessment (C3PAO)
    • CMMC Readiness Assessment
    • V-ISO Virtual Information Security Officer (CMMC)
    • Instructor-Led Training (ATP)
    • CMMC Explained
  • Training
  • Catapult®
    • About Security Catapult®
    • Security Catapult® Sign Up
    • Security Catapult® Log In
  • About
    • About Us
    • The Monarch ISC Team
    • Monarch Blog
    • Events
Contact Us
Contact Us
News

The Basics Of Cybersecurity Program Management

By John Rogers 

You’ve made the decision to bring your organization to a more cyber-secure place.
Maybe you’re doing this proactively – to guard your company from a cyber attack. Or
perhaps you’re required to do it to achieve legal, regulatory or industry compliance. Or,
worst case: you’ve been the target of a compromising cyber event.

Making your organization more cyber-secure is smart business, regardless of the
reasons. But because the cybersecurity landscape is continually changing, it’s not
uncommon for many in the executive wing to be a little hazy on how to get to a more
secure place.

Take a breath.

The first thing we tell our clients: Don’t panic. Even if your company has been
subjected to an attack, there are practical, effective steps you cake to mitigate the
damage and become more cyber-secure.

Wanting a “quick fix” after a cyber attack is understandable. But every organization’s
cybersecurity needs are different, just as every cyber attack has its own “signature” and
is designed to attack specific vulnerabilities. There’s no such thing as off-the-shelf,
plug-and-play, one-size-fits-all in this game. Cybersecurity is a commitment requiring
new strategies, policies investments…and crucially, action.

Step 1: Strategic Planning

You wouldn’t build a new facility or expand into a new market without a sound plan in
place. Cybersecurity requires the same due diligence.

The more you understand your organization’s place in the world, the more this become
apparent. Directly and indirectly, you interact with customers, suppliers, partners,
employees, distributors…investors, financial institutions, regulatory bodies,
government entities…competitors, industry groups, the media, and more. Security
breaches – malicious or otherwise – can come from any interaction and can cause
irreparable harm to your business.

Let’s review a few basics.

What is a Cybersecurity Plan?

A Cybersecurity Plan is a set of policies, standards, procedures and guidelines.
These identify what your organization’s cybersecurity requirements are, the protective
mechanisms you’ll need, how each should work, and who is responsible for each
function. The cybersecurity plan also provides for continual monitoring and regular
review to determine if your organization is properly defended against new cyber
threats.

Policies describe the “rules of the road” for everyone in your organization to follow:
Who needs to be involved? What needs to be done, and when? Which policies effect
all employees, and which are geared for management or the response team? What is
needed to maintain or restore a secure “status quo”? What happens after security is
restored to prevent another breach?

A very simple example of a policy: “All employees must enter a valid user ID and
password to log in to the company network.”

Standards specify the particulars of each policy – what one must do to fulfill each
requirement. Collectively, standards establish a baseline for employee behavior, i.e.,
what is proper security conduct and what is not.

Following our above example: “Each password must be 8-16 characters long, have at
least one capital letter, one number, and one special character, and cannot contain the
employee’s name or more than two (2) repeat characters in a row.”

Procedures are detailed instructions – precise directions needed to conform to any
policy or standard. Keep them simple enough that a trained professional can follow
them – you do not need to list every mouse click or keyboard entry.

Continuing with our above example:

To enter a new password, at the password screen press ctrl+alt+delete and then click
“Change Password.”

Finally, a guideline is a helpful way to do something (or not to do something).

“Don’t use your name, birthday or the word ‘password’ in your password.”

Cybersecurity Program Management

As with any top-line business program, you need a means of effectively monitor your
cybersecurity strategy to ensure it is operating as intended. That’s where
Cybersecurity Program Management comes in:

Component Identification – A cybersecurity plan has many individual components
that vary according to an organization’s size, operations, regulatory obligations,
business objectives, and potential cybersecurity threat. Knowing what you need (and
don’t need) is essential.

Information Architecture – What specific policies, standards, procedures and
guidelines will you need? What should each contain? Who will write them? Whose
input should you get, and whose should you discount? How and when should each be
reviewed and updated?

Testing – You can be sure that cyber criminals will be testing your defenses, so you
need to do it before they do. Stress-testing of your cybersecurity program can
include:

  • Internal and third-party audits, technical tests, penetration tests, vulnerability
    assessments, and risk assessments.
  • Testing of technologies such as firewalls, intrusion deception & prevention systems
    (IDS/IPS), and anti-malware systems.
  • Protection of physical assets such as facilities, network and other IT components,
    environmental sensors & controls, site access & monitoring, and other security
    measures.

Investigations – A fundamental aspect of any cybersecurity program is limiting and
managing variables. In particular, you need to know the people who come in and out
of your organization’s scope. Investigations may entail:

  • Employee employment, credential, criminal, financial, and other background
    checks.
  • Vetting of vendors, including their history, finances, personnel, and cybersecurity
    policies & certification.
  • Qualified and unbiased assessments of both existing and recommended technologies.
  • Thorough reviews of past cyber incidents, including realistic assessments of
    potential security vulnerabilities.
  • General due diligence relating to legal, financial and regulatory considerations.

Monitoring and Reporting – A cybersecurity program is not a “document” or
“policy”; it’s a functioning system operating in real time. As such, it must continually
monitored to make sure it is performing as designed.

Roles and Responsibilities – Who does what, and when? Who enforces policies and
procedures? Who is allowed to modify those policies and procedures, and under what
circumstances? Who is accountable?

Reviews – Technology changes. Laws and regulations change. Your business and your
customers change. The sophistication of cyber attacks change. Who initiates the
necessary changes to the cybersecurity plan? Who approves them?

If all this seems overwhelming…

Admittedly, there’s a lot to consider when tackling cybersecurity…which is why,
before you do anything, talk to a qualified cybersecurity expert.

Well, OK…but how can you tell the experts from the not-so-expert? Here’s how:

  • Review the company’s history. Ask for client references and check them out
    thoroughly. Also check out the credentials of the people you’ll be working with –
    for example, if they are CAICO, C3PAO and CMMC-AB certified.
  • Seek out those who present strategic options instead of simply tactical approaches.
    Tactics are strategy- and objective-dependent. Make sure you partner with
    someone who understands that your business goals are the priority, not policies
    or equipment.
  • Avoid anyone engaging in fear-mongering and cyber-jargon. You need calm,
    practical, straightforward, easily understood advice.
  • Finally, seek out someone who understands cybersecurity from a business owner’s
    perspective. Yes, cybersecurity is about keeping the bad guys out. But more
    importantly, it’s about making your business better:
    – Greater operational consistency and predictability.
    – Minimal disruption, preventing and avoiding dangerous situations, and quick
    recovery from adverse external events.
    – Better ability to seek out and secure rewarding business opportunities.
    – Enhanced sustainability.
    – More profitability.

Hacking Attacks: What about the Employees?
Previous Article
Data Breach: Anatomy of One Company’s Response
Next Article

Upcoming Events

June 16 - June 19

CMMC Certified Assessor Class (CCA)

  • Learn More
September 22 - September 26

CMMC Certified Professional Class (CCP)+

  • Learn More
October 14 - October 17

CMMC Certified Assessor Class (CCA)

  • Learn More
View Calendar

Contact The Monarch ISC Team

Your Security,
Our Commitment

At Monarch ISC, we assess your cybersecurity challenges, develop trusted strategies, and implement solutions efficiently. We help secure your business and ensure readiness against cybersecurity threats and CMMC audits with minimal operational disruption.

CAICO ATP LOGO
CYBER AB BADGE
CYBER AB Badge

Services

  • Advisory & Consultation
  • Policy & Plan Development
  • Risk Assessments
  • Incident Response Plans (IRP)
  • Disaster Recovery Plans & Exercises
  • Penetration Testing & Vulnerability Assessment
  • Instructor-Led Training
  • Supply Chain / Third Party Management
  • Monarch ISC V-ISO

Industries

  • Defense
  • Financial
  • Healthcare

CCA & CCP Training

CMMC

  • Authorized Certification Assessment (C3PAO)
  • Readiness Assessment
  • CMMC V-ISO
  • Instructor Lead Training (ATP)
  • CMMC Explained

About Us

  • Meet the Monarch Team
  • About Us
  • Blog
  • Events

Catapult®

  • Security Catapult® Log in
  • Security Catapult® About
  • Security Catapult® Sign Up

Contact Us

  • info@monarchisc.com
  • 22 Free Street
    Ste. 300
    Portland, ME 04101
  • 207 808 0472
  • LinkedIn
Ⓒ 2025 All rights reserved. Monarch ISC

Contact the Monarch ISC Team

207.808.0472

info@monarchisc.com

Click Here to Get Started With Catapult® Free

207.808.0472

info@monarchisc.com