4 Steps to Developing a Cyber Risk Management Plan

Why Creating a Cyber Risk Management Plan is Important

  • Determining the value of the company’s digital assets
  • Assessing the status of the company’s cybersecurity
  • Identifying and ranking potential cyber risks
  • Creating a disaster plan to follow in case of attack

How to Develop Your Cyber Risk Management Plan

1. Perform a Data Audit

  • Stored data, including both customer and employee records
  • Software and applications
  • Intellectual property

2. Perform a Security Assessment

  • Hardware infrastructure, including notebooks, servers, printers, and portable devices.
  • Network infrastructure and security, including the age and condition of key hardware.
  • Storage infrastructure, including current and future storage capabilities.
  • Authentication methods and access policies, focusing on how data is accessed and by whom.

3. Perform a Threat Assessment

  • Who might want to breach or attack your system and data assets?
  • Why might those entities want to access your data?
  • How might attackers try to breach your system?

4. Create a Disaster Recovery Plan

  • Identifying attacks in progress
  • Stopping ongoing attacks
  • Bringing affected systems back online
  • Recovering lost or damaged data
  • Restoring any compromised systems or applications

Beyond the Plan



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Secure Ephemeral Communications. Built for the enterprise. End-to-end encrypted messaging. Secure rooms. Peer-to-peer encrypted file sharing. Multi-platform.