Checklist D

Running an Effective Cybersecurity Program

Cyber extortion techniques and tactics vary widely. To defend against cyber extortion, organizations need to guard against all types of cybersecurity incidents by building and maintaining a strong cybersecurity program. To accomplish this, organizations need to know what they are trying to protect, understand their obligations, manage risk, and monitor risk.

Here is a checklist that organizations can use as a foundation for a strong cybersecurity program.

Know What You’re Trying to Protect

(Section 10.1.1)

Understanding the scope of your information resources is critical for maintaining an effective cybersecurity program and preparing for response.

  • Inventory data and assets. Take an inventory ...

Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.