The Cybersecurity Priorities Checklist Tool will help you filter out controls that are not applicable from a predefined list of primary, secondary, and tertiary priority domains. This tool will help you visualize a final list of initiatives to tackle as a subset of your overall information security strategy.
To use this tool, select (Y)es or (N)o under Relevant (Y/N) in the Cybersecurity Priorities tab for every Best-Practice Mitigation item listed. Once complete, the list can be used as a checklist to address as priorities.
Review the suggested Info-Tech materials for additional research content to address your identified priorities.