{"id":79973,"date":"2018-02-07T09:00:06","date_gmt":"2018-02-07T17:00:06","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=79973"},"modified":"2023-05-26T15:21:39","modified_gmt":"2023-05-26T22:21:39","slug":"developing-an-effective-cyber-strategy","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/02\/07\/developing-an-effective-cyber-strategy\/","title":{"rendered":"Developing an effective cyber strategy"},"content":{"rendered":"

The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. From a military perspective, strategy is a top-level plan designed to achieve one or more high-order goals. A clear strategy is especially important in times of uncertainty as it provides a framework for those involved in executing the strategy to make the decisions needed for success.<\/p>\n

In a corporate or government entity, the primary role of the Chief Information Security Officer (CISO) is to establish a clear cybersecurity strategy and oversee its execution. To establish an effective strategy, one must first understand, and it is recommended to document, the following:<\/p>\n