Table of contents Introduction ....................................................................................................... 3 6 steps for an effective cyber defence ................................................................ 3 Target audience ............................................................................................... 3 Step 1: The management’s toolbox....................................................................... 4 Good questions are important tools .................................................................... 5 8 questions that top management should ask themselves ..................................... 5 16 questions top management should ask their organizations ............................... 5 Step 2: Helpful technical measures ....................................................................... 7 Step 3: Conduct is key ........................................................................................ 9 Five essential phases in creating a good security culture ....................................... 9 Step 4: Detect your enemy ................................................................................ 11 Monitoring .................................................................................................... 11 Examination of potential incidents .................................................................... 11 Step 5: Be prepared! ........................................................................................ 12 Activation ..................................................................................................... 12 Mobilization ................................................................................................... 12 Organization ................................................................................................. 13 Execution...................................................................................................... 14 Termination .................................................................................................. 14 Step 6: Find the gaps in your cyber defence ........................................................ 16 Different types of security assessments ............................................................ 16 Applying assessment results ........................................................................... 17 References....................................................................................................... 18 Further reading (mainly in Danish) ..................................................................... 19 Kastellet 30 2100 København Ø Tel: + 45 3332 5580 Email: cfcs@cfcs.dk Frontpage illustration: Evgeniy Pavlovski/Shutterstock 3rd edition October 2021. 2

Select target paragraph3