Building a Security Strategy the Right Way

Given the wildly unexpected events of 2020 and their potential lasting impact that could change the way we work, CISOs should consider revisiting their existing strategies now or begin to plan new ones for 2021 and beyond. At Security Risk Advisors, we often field questions about building security strategy. A well-written strategic plan can serve as a guiding-light for decision making in a rapidly changing environment. Unfortunately, it is too common for CISOs and other security leaders, while intending to develop strategy, to actually develop tactical plans that are overly focused on technologies and specific outcomes with little guidance for the decision-making process and no common plan for team members to follow. Often, the result is a program that is painted into a corner and overly reliant on tools and technologies that are not right for the job. Building a security strategy, the right way, will be less impacted by unexpected events (like a pandemic) and will provide clear direction for how short-term tactical plans must change to continue to meet strategic goals.

How Do You Write a Strategic Plan?

There are many methodologies for writing a strategic plan, but one continually stands out to me as the most effective. In his book, Good Strategy / Bad Strategy: The Difference and Why It Matters, Richard Rumelt outlines a formulaic approach to designing a well-organized strategy that I have found incredibly useful in real world strategy development. The book is an excellent read and I highly recommend it to any leader. The basic formula is relatively straightforward and outlined below, as I have interpreted and used it.

A good strategic plan is:

Section 1. Diagnosis: Acknowledge the challenges at hand.

What is the current state? What threats and opportunities do you foresee, and how do they tie to the overall mission of the group (be it company, department, or team)?

Section 2. Guiding Policy: The high-level visions for how you will overcome the diagnosis and challenges at hand.

Guiding policies will often have tradeoffs, prioritizing desired outcomes and informing when its ok to focus on one thing vs another.

Section 3. Coherent Actions: Specific actions that directly support the Guiding Policy vision.

This is the most important part but be careful that it doesn’t become your tactical plan. Avoid all direct technology references and focus on providing tangible direction to your team on how to achieve the guiding policies.

Tips for Security Strategy Writing

Putting It to Good Use

In Closing

As referenced in Good Strategy / Bad Strategy: The Difference and Why It Matters by Richard Rumelt and observed in real life, few people take the time to sit down and actually write a strategic plan and even fewer approach it the right way. A strategy document, when written correctly, can be an incredibly useful guidepost in decision making and empower teams to think about their long-term plans and goals.

Example Security Strategy

While strategies can exist for the entire security program or individual teams, for the purpose of this article we will focus on developing a strategy to combat ransomware in the healthcare industry, a top risk of many hospitals today. Focus less on the content than on the execution in this example!