A minimalist, abstract seascape with panning motion combined with a long exposure. Image displays a fine grain texture at 100 percent.

Cyber Strategy Management – 1F. Finalize context review

Cybersecurity Strategy Management Framework

This article is part of the Cybersecurity Strategy Management Framework. The work on it is currently in progress. You can read more about the framework in this article.

Purpose

The primary goal of this activity is to assimilate stakeholder input and address their needs and expectations to ensure efficient project implementation and strategy acceptance.

Objectives

Alignment with business objectives
Leverage stakeholder feedback to ensure that the strategy aligns with business objectives.
Stakeholder engagement
Understand stakeholder expectations and requirements to secure their active participation, immediate cooperation, and strategy endorsement.
Efficient resource management
Prioritize and track stakeholder requirements for optimal resource allocation and to ensure that all crucial needs are met.

Inputs

Stakeholder inventory
List of cybersecurity stakeholders with their characteristics, including their influence, interest, and assignment to appropriate stakeholder categories. Developed as part of “1a. Analyze cybersecurity stakeholders” activity.
Business landscape0
Summary of the business environment in which the company operates and its business model, including customer segments, products and services, sales, distribution and communication channels. Developed as part of “1b. Review internal factors” activity.
Technology landscape
Summary of IT operating model, IT architecture, an overview of key technologies used by the company and critical infrastructure components. Developed as part of “1b. Review internal factors” activity.
Security landscape
An outline of the security landscape featuring the organizational structure, operating model, and the key frameworks in use.
Business and technology objectives
List of business and technology objectives, their prioritization, supporting initiatives and definition of common interests. Developed as part of “1b. Review internal factors” activity.
External factors
List of the market, technology, cyber and regulatory trends affecting your organization and cyber strategy, their impact and cyber implications. Developed as part of “1c. Review external factors” activity.
Threat landscape summary
Summary of prioritized organizational threat landscape presenting key risks, their description, criticality rating and most important attributes. Developed as part of “1d. Review threat landscape” activity.
Horizon meeting notes
Notes from the initial meetings with key stakeholders encompassing their feedback on internal and external factors impacting the cybersecurity strategy, stakeholder pains, gains and requirements related to project execution, cybersecurity strategy and cyber capabilities.

Prepare collection buckets

Over the course of your meetings with key stakeholders, you have captured significant notes related to the agenda items discussed. These notes typically fall into four categories, aligning with your meeting agenda:

Stakeholder feedback. This category encompasses comments and insights about the materials you prepared, including your understanding of the business and technology landscape, objectives, threat landscape, and other presentation elements.

Stakeholder pains. This category refers to the obstacles or issues your stakeholders confront while executing their jobs, trying to achieve their objectives, or dealing with cybersecurity topics.

Stakeholder gains. These are the positive outcomes your stakeholders expect from their roles, the accomplishment of their objectives, and the successful execution of the cybersecurity strategy development project. Gains can be tangible, such as cost savings, or intangible, like an enhanced customer experience or improved security posture.

Project requirements. These are the conditions that the cybersecurity strategy, or the capabilities developed or enhanced due to its execution, must satisfy.

You can use the following structures to organize your note collection categories defined below. Please note that all of the proposed fields may not be completed due to processing your meeting notes. However, they may prove useful when expanding on specific items or tracking them.

Stakeholder feedback

Feedback on the materials you have presented does not require a specific, long-term tracking structure. You can summarize this feedback using simple bullet points when sending meeting summaries and incorporate it into the deliverables you have presented.

Stakeholder pains

Clear and short title of the challenge or issue.
Description of the challenge or issue.
Type of the challenge, e.g., policy, process, technology, cost, resource, skills, quality, communication, stakeholder, regulatory, service.
Stakeholders affected by the challenge or issue.
Description of the impact based on your discussions with stakeholders.
How often does this challenge occur? Similarly, use an agreed qualitative rating scale for assessment.
Priority of the challenge based on your discussions, again using a qualitative rating scale. You can derive priority from impact rating and frequency.

Stakeholder gains

Name of the expected benefit.
A clear description of the benefit.
Type of the benefit, e.g., financial or non-financial.
Stakeholders that will gain directly or indirectly from this benefit.
Priority of the benefit based on your discussions, measured using an agreed qualitative rating scale, e.g., 1 – Very Low, 2 – Low, 3 – Medium, 4 – High, 5 – Very High.
Definition of the metric to measure the realization of this benefit during the project execution.
The current metric level before the project commences to demonstrate progress and convey achievements later.
The expected level of the metric after successful implementation of the cyber strategy to understand whether the benefit was realized.

Project requirements

Short name of the requirement.
Description of what must, should or could be done during the execution of the strategy development project.
List of stakeholders who raised the requirement.
Priority of the requirement using categories such as 1 – Must Be, 2 – Should Be, 3 – Could Be, 4 – Will Not Be. The last status is often used to limit the scope of the project.
Internal status of the requirement that you will use to filter out requirements in their lifecycle, e.g., New, Approved, Rejected, Canceled.

Integrate stakeholder feedback

In your activities “1b. Review internal factors” and “1c. Review external factors,” you outlined the internal and external factors that affect cybersecurity. You presented these factors during your meetings with key stakeholders, conducted as part of the “1e. Interview key stakeholders” activity.

Now is the time to process and incorporate the feedback collected during these discussions:

Refine business landscape. Review and update your understanding of the business landscape. This understanding includes the organizational structure, business model, governance and management frameworks, and a summary of the organizational culture.

Refine technology landscape. Use a similar approach to update your summary of the technology landscape. This summary should cover IT architecture, IT organizational structure, and IT operating model.

Revise business and technology objectives. Reflect on the feedback you received about the list of business and technology objectives. Reevaluate their priorities and common interests based on your discussions’ outcomes. Aim to align these common interests closely with the challenges and benefits that stakeholders identified.

Incorporating stakeholder feedback assists in addressing their needs and expectations. This process builds a sense of project ownership and assures the acceptance of the final product.

Review stakeholder gains

As part of “1e. Interview key stakeholders” activity you have had valuable discussions with key stakeholders regarding the benefits they expect in the following areas:

Role. These benefits pertain to the outcomes your key stakeholders expect from their roles. Understanding these expectations will prove beneficial for future stakeholder management activities and ensuring stakeholder support.

Objectives. These are the benefits stakeholders expect from achieving organizational business or technology objectives. If these benefits are already encapsulated within these objectives, there is no need for additional documentation. However, if there are specific benefits not clearly articulated as part of these objectives, include them in your Gains collection bucket. This information will also help in future stakeholder management activities and garnering stakeholder support.

Cybersecurity. These represent key benefits your stakeholders expect from the successful implementation of the cybersecurity strategy. Including these in your Gains collection bucket will be useful when crafting your collaboration and communication plans related to the cybersecurity strategy project.

To effectively process your meeting notes concerning stakeholder gains, consider these steps:

Identify stakeholder gains. Review your meeting notes to identify critical benefits mentioned by your stakeholders. Try to understand why each benefit might be essential for them. Often, you might uncover underlying motivations beyond those openly expressed.

Allocate stakeholders. Assign all stakeholders who mentioned a specific expected benefit. The more stakeholders interested in a particular benefit, the higher its priority.

Determine priority. Prioritize each benefit. Gauge priority by examining how many stakeholders will directly or indirectly gain from a particular benefit based on your discussions. Another method is analyzing how many business or technology objectives might reference this benefit. Then, you can use a pre-agreed qualitative rating scale (e.g., 1 – Very Low, 2 – Low, 3 – Medium, 4 – High, 5 – Very High) to rate the priority.

Select a measurement metric. Choose a metric to measure the realization of each benefit during project execution. It is better to have a single metric related to a specific benefit or even try to find a metric that can track the achievement of a group of similar benefits. The more metrics you have, the more complex it is to manage them, and administrative overhead can unnecessarily grow. The best metrics are PRAGMATIC, as described by W. Krag Brotby and Gary Hinson in their book “PRAGMATIC Security Metrics: Applying Metametrics to Information Security.” These metrics are Predictive, Relevant, Actionable, Genuine, Meaningful, Accurate, Timely, Independent, and Cheap.

Review baseline metric value. Evaluate the current metric value before the project commences. This value will help you track progress during the project execution and communicate achievements to maintain stakeholder interest in the project and articulate its value for the organization.

Establish target metric value. If feasible at this stage, you can try to define the target value for metrics. However, in some cases, it may be better to wait until you complete an assessment of the current state of cybersecurity capabilities. Your approach depends on your organizational culture and management style. Some strategists prefer to establish inspiring targets to keep teams motivated, while others opt to underpromise and overdeliver.

TitleDescriptionStakeholdersPriorityMetric
GA001 Regulatory complianceEnsure compliance with new data privacy laws that must be implemented by the end of next year.CIO, CTO5 - Very HighInformation security compliance management maturity, Status of compliance with externally imposed information security obligations, Historic consequences of incompliance
GA002 Secure cloud adoptionImplement comprehensive framework supported by required teams, processes and tools to allow secure cloud adoption with a focus on protection of customer data and availability of our services.CEO, CIO, CTO4 - HighCloud security maturity
GA003 Secure software developmentAllow secure implementation of agile software development approach to ensure that speed to market is increased but not at the cost of software security.CIO, CTO4 - HighSoftware security maturity, Number of unresolved vulnerabilities
GA004 Lean securityReduce the cost of security by removing obsolete and duplicate controls, simplifying the technologies used by security teams and simplifying security processes that hinder employee productivity.COO, CTO, CFO3 - MediumInformation security budget variance, Percentage of controls that are ossified or redundant, Annual cost of information security controls, Information security expenditure

Review stakeholder pains

During your stakeholder meetings, you have asked your stakeholders about their pains – the issues, problems, or challenges they are facing. These could fall into the following categories:

Role. These are the challenges your stakeholders face in their roles when conducting their daily responsibilities, which are part of their job description. You discussed them as the “2A – Your role” point in your meeting agenda.

Objectives. These are obstacles or risks that stakeholders need to address to achieve their business or technology goals, as discussed under the “2E – Objectives” agenda item.

Cybersecurity. These are the significant challenges or problems your stakeholders perceive in the cybersecurity area, discussed under the “3B – Benefits and Challenges” agenda item. Please note, this initial list of challenges will be expanded during the “3b. Conduct maturity assessment” activity.

To document them in an organized fashion, you can process your meeting notes related to stakeholder Pains in the following way:

Identify stakeholder pains. Review the notes gathered in your Pains collection bucket. Aim to understand the root causes of these issues, challenges, or problems. Addressing these root causes could yield more beneficial outcomes than dealing with their effects alone.

Define pain type. Categorize pains into different types like policy, process, technology, cost, resource, skills, quality, communication, stakeholder, regulatory, service. This categorization can help you identify the majority of the work required in strategy development.

Assign stakeholders. Link the stakeholders who have mentioned specific challenges that affect them. The more stakeholders a particular challenge impacts, the more likely you are to secure support when your strategy proposes viable solutions to these problems.

Describe the impact. Illustrate the effect each challenge has on your key stakeholders. Categorizing the severity of these impacts can help to define the priority of the pain.

Assess impact rating (optional). If you wish, you can rate the impact based on your stakeholder discussions using a qualitative scale, like:

The issue causes minor inconveniences that do not affect our business or technology service performance or hinder the achievement of our objectives.
The issue may cause disruptions, but workarounds are in place to prevent a significant impact on our performance or objectives.
The issue may impact our performance and make achieving objectives more difficult. Limited workarounds may exist, but the issue cannot be ignored.
The issue significantly impacts our performance and could jeopardize achieving our business or technology objectives. There are few or no workarounds. The root causes of the issue must be addressed.
The issue has a severe impact. It could lead to prolonged disruption, significant losses, and critical damages to our business. The problem must be resolved immediately.

Assess issue frequency (optional). This step involves assessing the frequency of the issue based on discussions with your key stakeholders. You can use a qualitative rating scale such as 1 – Very Low, 2 – Low, 3 – Medium, 4 – High, 5 – Very High. We presented a similar scale in our approach to reviewing the threat landscape, as documented in the “1d. Review threat landscape” activity under the “7. Estimate the inherent likelihood” section. Ideally, this scale should denote the timeframe in which you assess the frequency to ensure comparable results.

Define priority. The previously outlined steps, “Assess impact rating” and “Assess issue frequency,” are optional. There may be occasions when these steps are excessive. However, if you have undertaken these assessments, you can use them to determine the priority of the stakeholder pain. You can employ a similar rating scale as the one used in the “8. Calculate inherent risk” section of the “1d. Review threat landscape” activity. If not, you can attempt to determine the issue priority based on the impacts identified by your stakeholders and the number of stakeholders impacted by the issue. For prioritization, you may use a simple qualitative rating scale like 1 – Very Low, 2 – Low, 3 – Medium, 4 – High, and 5 – Very High.

TitleDescriptionStakeholdersImpact DescriptionPriority
PA001 Outdated infrastructureOur hosting infrastructure is outdated, with 25% of applications relying on unsupported legacy software.CTO, CIO, CISOIn 2022, 60% of incidents with an impact classified as High or Very High were caused by exploiting known vulnerabilities in legacy systems.5 - Very High
PA002 Data leakage issuesWe lack efficient tools to identify, classify, and control the storage and transfer of unstructured confidential data.CISOLast year, we experienced three incidents related to data leakage via web and email channels, leading to regulatory actions.5 - Very High
PA003 Outdated cybersecurity strategyOur existing cybersecurity strategy does not support new use cases, including cloud adoption, machine learning, and agile software development.CEO, CTO, CIO, CISOThe lack of secure approaches to new technologies hinders their implementation and may affect our competitive advantage.4 - High
PA004 Inefficient software testingOur current approach to security testing is inefficient. It relies primarily on penetration testing and does not support agile software development methodologies.CTO, CIO, Product OwnerThe cost of penetration testing doubled last year. Coding mistakes are detected too late, thereby increasing remediation costs. Our existing security approach hampers software development.3 - Medium
PA005 Inefficient access managementWe use too many access management solutions. The onboarding process for new employees is time-consuming, and they often do not have all the necessary access permissions on their first day of work. The review process for user entitlements is overly complex, causing line managers to spend excessive time or simply approve access without adequate consideration.COO, CTODelays and mistakes during the employee onboarding process lead to decreased productivity. There is too much administrative overhead for line managers. Unremediated excessive user permissions increase the risk of fraud or insider threats.3 - Medium

Document project requirements

The success of a cybersecurity strategy in any organization significantly depends on the active involvement and buy-in from its stakeholders. These stakeholders bring their perspectives on cyber topics and a set of requirements to the table. Addressing these requirements is a crucial step in defining an effective cybersecurity strategy for the following reasons:

Utilize lessons learned. Stakeholder requirements can provide valuable insights that guide the direction of strategy implementation. Their diverse experiences and expertise can offer a well-rounded understanding of critical factors required for successful strategy implementation within your organizational context.

Ensure buy-in. Addressing stakeholder requirements fosters engagement and secures buy-in. When stakeholders see their needs and concerns being considered, they are more likely to support the project. This support can manifest in various ways, from championing the strategy within the organization to providing resources or helping overcome obstacles.

Manage expectations. Taking stakeholder requirements into account helps manage risks and expectations. By understanding stakeholders’ expectations, you can align them with project realities, reducing the risk of future disappointment or conflict. Additionally, being aware of stakeholder requirements can help you foresee potential challenges or opposition, enabling proactive risk management.

To leverage these benefits, review the requirements discussed during the “4A – Your expectations” agenda item in the “1e. Interview key stakeholders” activity:

Process your meeting notes. Process the notes you collected in your Requirements bucket. Also, consider other points you noted to elicit statements that could be reflected as project requirements. Note any requirements related to project execution and specific security capabilities mentioned by your stakeholders. However, detailed requirements related to specific capabilities will be collected later in the strategy development process.

Keep track of stakeholders. Maintain a record of who requested specific requirements. This information will be valuable for prioritizing your requirements and communicating the progress of these requirements to relevant individuals.

Prioritize the requirements. Addressing all requirements may be challenging due to limited project resources. Additionally, stakeholders may have varying views on the importance of different requirements. Therefore, it is essential to prioritize these requirements. During prioritization, consider stakeholder power and interest levels and the overall alignment with the objectives you previously identified. A popular approach is to categorize the requirements as Must Have, Should Have, Could Have, and Will Not Have. This categorization delineates non-negotiable, desirable, and optional requirements.

Track the status of requirements. Keeping track of different project requirements allows you to monitor progress toward fulfilling each requirement, adjust the allocation of project resources, identify potential bottlenecks, and provide updates on project progress. This also promotes accountability and transparency concerning project-related decisions. To keep track of your requirements, assign a simple status to each of them, e.g., New, In Review, Approved, In Progress, Completed, Rejected, or Cancelled.

TitleDescriptionStakeholdersPriorityStatus
PRQ001 Alignment with organizational objectivesCybersecurity strategy objectives must be aligned and support achieving business and technology objectives.CEO, COO, CTO, CIO1 - Must HaveApproved
PRQ002 Cost-saving opportunitiesThe strategy development process must include a review of current capabilities to identify cost-saving opportunities in line with agreed budget targets.CEO, COO, CFO1 - Must HaveApproved
PRQ003 Review existing programsThe strategy development process must include reviewing existing cyber programs to avoid duplication of efforts and ensure cost synergies.CSO, CISO1 - Must HaveApproved

Update stakeholder characteristics

During your discussions with key stakeholders, you may need to revise your initial assumptions about stakeholder characteristics or identify new ones. Therefore, at this stage, you should finalize your stakeholder analysis based on your interviews. For some of the items specified below, you may have clear answers from your discussions with key stakeholders. For other stakeholder categories, you can make initial assumptions. Even when you assess some of the items below based on stakeholder feedback, you need to balance what you were told during the meetings with your own judgement of your stakeholders.

Add new stakeholders. Include any new stakeholders identified during the interviews to ensure that your list is as comprehensive as possible.

Classify new stakeholders. Determine the interest and power of new stakeholders as described in the activity “1a. Identify and classify stakeholders“. Classify them according to the matrix presented in that article.

Understand stakeholder relationships. If time permits, try to identify stakeholder relationships to understand their networks and who may be influenced by whom. Stakeholders with larger networks may have a greater stakeholder impact rating than is implied by their formal job title and position within the organizational structure.

Review stakeholder characteristics. Review your initial assumptions about stakeholder impact, interest, and classification based on the results of your stakeholder interviews. Update your stakeholder inventory as necessary. Interview additional stakeholders if they have become key players and their input could impact the success of the cybersecurity strategy development project.

Assess strategy impact on stakeholders. Assess the potential impact of a new cybersecurity strategy on your stakeholders. This is an optional activity at this stage, considering you will understand the real impact on specific stakeholders after defining strategic objectives for cybersecurity and a list of supporting initiatives. However, a rough estimate at this stage may help you define better collaboration and communication plans. You can measure this impact using a qualitative scale (e.g. Low, Medium, and High) or a quantitative approach using a scale of 1 to 10.

Assess level of involvement. Evaluate the degree to which your key stakeholders would like to be involved in the project, based on your conversations with them. This will influence the definition of your collaboration and communication plans. If their interest in the project is high and they have available time, their level of involvement will usually be high. At other times, they may appoint delegates who should be included in your collaboration and communication plans to prevent surprises for your key stakeholders.

Update stakeholder inventory. The results of all the activities defined above should be documented in your stakeholder inventory. Below, you can see an example of a completed stakeholder inventory at this stage, which will be helpful when defining collaboration and communication plans. By now, your stakeholder inventory should contain the following information:

This is the name of the stakeholder or stakeholder group.
This refers to the type of the stakeholder, e.g., Internal or External.
This represents the level of stakeholder power – their capacity to influence people’s behaviors and effect change. This was assessed during the “1a. Analyze cybersecurity stakeholders” activity.
This denotes the level of stakeholder interest in the cybersecurity strategy. It was also assessed during the “1a. Analyze cybersecurity stakeholders” activity.
This is the stakeholder tier assessed based on their power and interest, determined as part of the “1a. Analyze cybersecurity stakeholders” activity.
This illustrates the degree to which the cybersecurity strategy may affect the stakeholder.
This indicates the extent to which the stakeholder would like to be involved in the strategy development project.

Send meeting summaries

As part of the activity “1e. Interview key stakeholders“, you have held numerous meetings with key stakeholders to understand their value drivers and expectations about cybersecurity. These meetings provided a platform for stakeholders to offer their feedback on your research related to the business context, elaborate on expected benefits, express the challenges they encounter and articulate their requirements for the cybersecurity strategy development project.

A fundamental step following these meetings is to summarize their outcomes. Precise, succinct, and actionable meeting summaries aid in maintaining alignment and momentum throughout the strategy development project.

Your meeting summaries can include the following elements:

Key insights. Summarize the key points of discussion for each agenda item. Focus on critical facts and statements from your stakeholders. Highlight any substantial insights or discoveries from the meeting. These might include challenges or benefits that stakeholders identified, new requirements, or valuable feedback.

Actions. Compile a list of actions that need addressing. This list could include areas that need more research, disagreements that need resolution, or tasks that await completion. Clearly assign each action to its owner and provide expected completion dates. Presenting this section in a tabular format can be beneficial, as it offers an easy reference for those with assigned tasks.

Decisions. Spotlight the decisions made during the meeting. Articulate these decisions clearly and leave no room for misinterpretation. Be specific about what was decided. Include a sentence explaining the reasoning behind each decision to help communicate the context to those not that were not initially part of the discussion.

Next steps. Wrap up the summary with a brief outline of the next steps. This outline should include any upcoming meetings or deadlines. It helps keep everyone on track and aligns with the project’s timeline.

Remember to keep your language clear and straightforward. Ensure to distribute the summary promptly while the meeting remains fresh in the participants’ minds.

Lastly, encourage recipients to review the summary and provide any necessary corrections or additions to ensure that shared information is correct.

Outputs

Stakeholder inventory
List of cybersecurity stakeholders with their characteristics, including their influence, interest, and assignment to appropriate stakeholder categories.
Business landscape
Summary of the business environment in which the company operates and its business model, including customer segments, products and services, sales, distribution and communication channels.
Technology landscape
Summary of IT operating model, IT architecture, an overview of key technologies used by the company and critical infrastructure components.
Security landscape
An outline of the security landscape featuring the organizational structure, operating model, and the key frameworks in use.
Business and technology objectives
List of business and technology objectives, their prioritization, supporting initiatives and definition of common interests.
External factors
List of the market, technology, cyber and regulatory trends affecting your organization and cyber strategy, their impact and cyber implications.
Threat landscape summary
Summary of prioritized organizational threat landscape presenting key risks, their description, criticality rating and most essential attributes.
Pains
The list of challenges, issues, deficiencies or obstacles related to stakeholder roles, achievement of business and technology objectives or cybersecurity capabilities.
Gains
The list of positive outcomes stakeholders expect from their roles, accomplishment of their objectives, and anticipated benefits from cybersecurity.
Project requirements
The list of conditions related to project execution, cybersecurity strategy, or the capabilities developed or enhanced due to strategy implementation.
Meeting summaries
Summaries of meetings with key stakeholders, including critical insights from discussions, actions, decisions and next steps.
Cybersecurity Strategy Management Framework

This article is part of the Cybersecurity Strategy Management Framework. The work on it is currently in progress. You can read more about the framework in this article.