Cybersecurity Program - part 2 | Adopting the right framework

Adopting the right framework for your cybersecurity program is crucial for aligning security measures with business objectives, regulatory requirements, and risk management strategies. A well-suited framework enhances governance, optimises resource allocation, and provides a structured approach to threat mitigation. Selecting the appropriate model ensures adaptability, continuous improvement, and resilience against evolving cyber threats.

PROCESS

Mario Conte

2/17/20253 min read

In my previous article, I shared tips and examples on how to initiate the planning of your cybersecurity program by leveraging both internal and external drivers. There are various methods, resources, and tools available to conduct this assessment effectively.

Recap of part 1 (Mapping internal and external drivers):

" Internal Drivers: When considering internal factors, it is essential to align the cybersecurity strategy with business objectives, organisational context, governance framework, risk appetite, corporate culture, and user profiles. These elements provide a strong foundation for a security program tailored to the company’s unique needs.

External Drivers: Externally, it is crucial to take into account market trends, legal and regulatory requirements, privacy standards, emerging technologies, and teams management. These factors help ensure that the cybersecurity strategy remains aligned with industry best practices and evolving compliance obligations.

By carefully analysing both internal and external drivers, organisations can develop a cybersecurity program that is strategic, adaptable, and effective in mitigating risks while supporting business goals."

Advancing the Strategy

The next step in building a cybersecurity program is adopting a methodology or framework to structure the previously conducted assessment. Most frameworks assist in program governance, risk management, cybersecurity maturity assessment, and other key aspects.

Among the main framework options are NIST, CIS Controls, COBIT, and others. Based on recent experiences, I opted for NIST CSF due to its comprehensive and flexible approach, which suited my needs perfectly. However, the choice should be tailored to each business and the focus of the program whether cybersecurity, risk management, services, or processes.

Applying a framework is fundamental to a successful program, as it helps prioritise cybersecurity topics, allocate organisational resources efficiently, manage constraints, and define decision-making strategies. Moreover, it provides a solid foundation for justifying investments.

It is important to emphasise that this process must be actionable,there´s no point in documenting theories that cannot be implemented in reality. Therefore, the chosen methodology should be reviewed regularly to ensure it remains relevant and effective.

One of the recurring challenges in this process is decision-making regarding expenses, a highly sensitive topic that should be discussed based on risk classification. The plan must justify each cost, always considering the expected return on investment, in other words, balancing cost and benefit.

I personally benefit from frameworks both internally, to manage the organisation’s security capabilities, and externally, to monitor and communicate with the entire supply chain. The latter presents a constant challenge, as different suppliers may adopt different cybersecurity frameworks, in addition to cultural and regional variations.

Seven Steps for Implementation

1. Prioritise and define scope – Establish the program's core and align the strategy based on identified drivers.

2. Orient – Integrate security within the business context, making correlations between cybersecurity and business strategy transparent to all stakeholders. The goal is to highlight how cybersecurity adds value to the organisation.

3. Create the current profile – Assess the organisation’s current state through detailed environmental evaluations. This step provides a clear roadmap for the desired future state.

4. Conduct a risk assessment – Identify the controls already in place and analyse the current level of risk exposure.

5. Create the target profile – Define strategic objectives and describe how the organisation will look upon achieving them.

6. Identify, analyse, and prioritise gaps – Perform a meticulous gap analysis to bridge the divide between the current and desired state, determining corrective actions for each identified issue.

7. Implement the action plan – Execute the initiatives designed to close identified gaps and strengthen the cybersecurity programme.

By following this structured approach, organisations can build a solid cybersecurity program that aligns with business needs and is well-equipped to tackle both internal and external challenges.

Conclusion

Implementing an effective cybersecurity program requires a solid strategic plan tailored to the organisation’s needs and characteristics. By considering internal and external factors, selecting the right framework, and following a structured plan, businesses can strengthen their security posture and minimise risks.

However, more than simply following a fixed plan, it is crucial to ensure the process remains dynamic, regularly reviewed, and adjusted as threats evolve and the corporate environment changes. Cybersecurity is not a final destination but rather an ongoing journey of improvement and adaptation.

By adopting this mindset, your organisation will be better prepared to face challenges, optimise investments, and, most importantly, ensure resilience.