Table of contents
Introduction ....................................................................................................... 3
6 steps for an effective cyber defence ................................................................ 3
Target audience ............................................................................................... 3
Step 1: The management’s toolbox....................................................................... 4
Good questions are important tools .................................................................... 5
8 questions that top management should ask themselves ..................................... 5
16 questions top management should ask their organizations ............................... 5
Step 2: Helpful technical measures ....................................................................... 7
Step 3: Conduct is key ........................................................................................ 9
Five essential phases in creating a good security culture ....................................... 9
Step 4: Detect your enemy ................................................................................ 11
Monitoring .................................................................................................... 11
Examination of potential incidents .................................................................... 11
Step 5: Be prepared! ........................................................................................ 12
Activation ..................................................................................................... 12
Mobilization ................................................................................................... 12
Organization ................................................................................................. 13
Execution...................................................................................................... 14
Termination .................................................................................................. 14
Step 6: Find the gaps in your cyber defence ........................................................ 16
Different types of security assessments ............................................................ 16
Applying assessment results ........................................................................... 17
References....................................................................................................... 18
Further reading (mainly in Danish) ..................................................................... 19
Kastellet 30
2100 København Ø
Tel: + 45 3332 5580
Email: cfcs@cfcs.dk
Frontpage illustration: Evgeniy Pavlovski/Shutterstock
3rd edition October 2021.
2