{"id":79973,"date":"2018-02-07T09:00:06","date_gmt":"2018-02-07T17:00:06","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=79973"},"modified":"2023-05-26T15:21:39","modified_gmt":"2023-05-26T22:21:39","slug":"developing-an-effective-cyber-strategy","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/02\/07\/developing-an-effective-cyber-strategy\/","title":{"rendered":"Developing an effective cyber strategy"},"content":{"rendered":"
The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. From a military perspective, strategy is a top-level plan designed to achieve one or more high-order goals. A clear strategy is especially important in times of uncertainty as it provides a framework for those involved in executing the strategy to make the decisions needed for success.<\/p>\n
In a corporate or government entity, the primary role of the Chief Information Security Officer (CISO) is to establish a clear cybersecurity strategy and oversee its execution. To establish an effective strategy, one must first understand, and it is recommended to document, the following:<\/p>\n
Once a CISO has a clear picture of the items discussed above, they can begin formulating a strategy appropriate to the task at hand. There is no \u201cone size fits all\u201d approach, as each organization is unique, but there are models and frameworks that have proven helpful over time, including those developed by the National Institute of Standards and Technology, Cyber Kill Chain, Center for Internet Security, SANS, and the Australian Signals Directorate, among others. An effective strategy must also consider human and organizational dynamics. For example, employees will typically \u201cwork around\u201d a control that increases the actual, or perceived, amount of effort to perform a given task, especially when they feel that the effort is not commensurate with the threat being addressed.<\/p>\n
At Microsoft, we are continuously evaluating the current threats faced by our customers and building products and services to help CISOs execute their strategies. The design of our products not only accounts for the techniques utilized by cyber attackers, but also incorporates features that address the human dynamics within an enterprise and the staff and retention challenges faced by security teams. A few examples of these design principles in practice include building security features and functions within our productivity tools such as Office 365 Advanced Threat Protection, using auto-classification to reduce the workload on end users with Azure Information Protection, and increasing the efficiency and effectiveness of security teams with Windows Defender Advanced Threat Protection.<\/p>\n","protected":false},"excerpt":{"rendered":"
The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. From a military perspective, strategy is a top-level plan designed to achieve one or more high-order goals. A clear strategy is especially important in times of uncertainty as it provides a framework for those […]<\/p>\n","protected":false},"author":61,"featured_media":80117,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3684],"products":[],"threat-intelligence":[],"tags":[3822,3809],"coauthors":[1916],"class_list":["post-79973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-security-operations","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\n