
- Take stock of the existing capabilities and risks
- Provide a clear approach and controls required to protect attacks
- Create a scalable organizational risk management model
- Install a tolerance limit and metrics
- Create the right responses during any breach