- Exploring the current cybersecurity threat landscape
- Developing and executing a cybersecurity strategy and partnering with other stakeholders
- Worse case scenario – developing and implementing a disaster recovery plan
- Defending data from breaches and unauthorised access
- Protecting the organisation’s technological assets