You've decided cybersecurity needs to be a priority. Maybe a near-miss rattled you. Maybe a client asked about your security practices and you didn't have a good answer. Maybe you read the headlines and realized your company is one phishing email away from a very bad week.
Whatever brought you here, the question is the same: where do you start?
The answer isn't a massive, year-long transformation project. It's a focused 90-day sprint that builds momentum, addresses the most critical gaps, and creates a foundation for long-term security maturity. You don't need a perfect security program on day one. You need a working one.
This guide breaks the sprint into three phases: Assess and Protect (Days 1-30), Build and Strengthen (Days 31-60), and Sustain and Improve (Days 61-90). Each phase has specific milestones, deliverables, and a checklist so you can track progress.
Phase 1: Assess and Protect (Days 1-30)
The first 30 days are about understanding where you stand and closing the most dangerous gaps immediately. Think of this as triage: stop the bleeding before you start physical therapy.
Week 1-2: Know What You Have
You can't protect what you don't know about. Start with a comprehensive inventory of your digital assets.
- Hardware inventory: Every laptop, desktop, server, mobile device, and network device in your organization
- Software inventory: Every application, SaaS subscription, and cloud service your team uses (including shadow IT they adopted without approval)
- Data mapping: Where does your sensitive data live? Customer records, financial data, employee PII, intellectual property, identify the crown jewels
- Access audit: Who has access to what? Identify admin accounts, shared credentials, and former employees who still have active access
Day-One Priority
Immediately disable any accounts belonging to former employees. This is the single fastest risk reduction action you can take, and it costs nothing.
A common pattern: companies skip the software inventory because they assume IT already knows what's running. Research tells a different story. According to Gartner, one-third of successful cyberattacks target data in shadow IT infrastructure, and industry studies consistently show that enterprises use two to three times more SaaS applications than IT departments are aware of. Each unapproved app is a potential access point that nobody is monitoring.
Week 2-3: Deploy Essential Controls
With your inventory complete, deploy the controls that provide the highest risk reduction per dollar spent:
Multi-factor authentication (MFA) on everything. Email, VPN, cloud applications, financial systems, if it has a login, it gets MFA. This single control blocks over 99% of credential-based attacks.
Endpoint protection on every device. Replace legacy antivirus with a modern endpoint detection and response (EDR) solution. Many are affordable for SMBs and provide dramatically better protection.
Email security beyond the defaults. Implement advanced phishing protection, DMARC/DKIM/SPF records, and consider an email security gateway that scans attachments and links before they reach your employees.
Backup verification. Confirm that your backups are running, complete, and, critically, that you can actually restore from them. Test a restore. Many organizations discover their backups are broken only when they need them most.
Here's what typically goes wrong in this phase: MFA rollout stalls because a handful of senior leaders push back on the inconvenience. Don't let that happen. If the CEO isn't using MFA, nobody else will take it seriously either.
If budget is tight, prioritize MFA and backup verification above everything else. You can deploy EDR next month. You cannot undo a ransomware attack that exploited a password-only login on your VPN.
Week 3-4: Conduct a Risk Assessment
A risk assessment doesn't need to be a six-month consulting engagement. At the SMB level, a focused assessment that covers your most critical areas can be completed in days.
Evaluate risk across these domains:
- External exposure: What does an attacker see when they look at your company from the outside? Unpatched systems, open ports, exposed services?
- Internal vulnerabilities: Weak passwords, unpatched software, misconfigured cloud services
- Human factors: How susceptible are your employees to phishing? Have they received any training?
- Third-party risk: What vendors have access to your systems or data?
Document the findings and rank them by business impact. This becomes your roadmap for Phase 2.
Phase 1 Checklist
- Complete hardware and software inventory
- Map sensitive data locations
- Disable all former employee accounts
- Deploy MFA on all critical systems
- Install EDR on all endpoints
- Verify email security settings (DMARC, DKIM, SPF)
- Test backup restoration
- Complete initial risk assessment
- Prioritize findings by business impact
Phase 2: Build and Strengthen (Days 31-60)
With the urgent gaps closed and a clear picture of your risk landscape, Phase 2 shifts to building the operational foundation for sustainable security.
This is where most security programs lose momentum. The urgency of Phase 1 fades, and people start treating security as something they'll get back to next quarter. Industry analysts note that security programs typically stall rather than fail outright -- competing business priorities emerge, internal bandwidth tightens, and initiatives slow when no one owns the program end-to-end. The CEO has to keep pushing here.
Establish Security Policies
You don't need a 200-page policy manual. You need clear, enforceable policies that cover the essentials:
1Acceptable Use Policy
What employees can and cannot do with company systems, devices, and data. Keep it short and readable.
2Incident Response Plan
Who does what when something goes wrong. Include contact lists, escalation procedures, and communication templates.
3Access Control Policy
How access is granted, reviewed, and revoked. Include the principle of least privilege and regular access reviews.
4Vendor Management Policy
How you evaluate, onboard, and monitor third-party vendors who access your systems or data.
Launch Security Awareness Training
Your employees are your largest attack surface and your strongest potential defense. A good training program transforms them from a liability into an asset.
Key elements of effective training:
- Short, frequent sessions rather than one annual marathon. Monthly 15-minute modules beat a yearly two-hour course.
- Phishing simulations that test employees with realistic scenarios. Track click rates over time to measure improvement.
- Role-specific content. Your finance team faces different threats than your engineering team. Tailor the training accordingly.
- Positive reinforcement. Celebrate employees who report suspicious emails. Never punish people for asking questions.
Implement Monitoring
If you're not monitoring your environment, you won't know when something goes wrong until the damage is done. At a minimum, implement:
- Log collection from critical systems (firewalls, email, cloud services, endpoints)
- Alert configuration for high-risk events (failed login attempts, admin account changes, unusual data transfers)
- Regular review cadence, Someone needs to actually look at these logs. If you don't have the staff, this is where a managed security provider adds significant value.
If budget is tight, skip the SIEM platform for now and focus on the built-in alerting in your cloud services (Microsoft 365, Google Workspace, AWS). These are free and catch more than you'd expect. You can upgrade to a proper SIEM later.
Phase 2 Checklist
- Draft and publish core security policies
- Create an incident response plan with contact lists
- Launch security awareness training program
- Conduct first phishing simulation
- Implement log collection from critical systems
- Configure alerts for high-risk events
- Establish a regular log review cadence
- Begin addressing top findings from Phase 1 risk assessment
Phase 3: Sustain and Improve (Days 61-90)
Phase 3 is about turning your sprint into a sustained practice. The controls and processes you've built need to become habits, and the program needs governance to keep it on track.
Conduct a Tabletop Exercise
A tabletop exercise is a structured walkthrough of a breach scenario with your key stakeholders. It's the most effective way to test your incident response plan without the pressure of a real incident.
Gather your leadership team, IT, legal, and communications leads. Walk through a realistic scenario: a ransomware attack, a data breach, a business email compromise. Ask questions like:
- Who calls the insurance company?
- Who talks to the press?
- How do we communicate with customers?
- Can we operate without our primary systems for 48 hours?
- Where is our incident response plan documented?
The goal isn't perfection. It's identifying gaps and building muscle memory before you need it. The first tabletop exercise is almost always humbling. Common findings include gaps in communication protocols, unclear roles and responsibilities, and outdated contact information. According to the IBM Cost of a Data Breach Report (2024), organizations with incident response teams that regularly test their plans save an average of $248,000 per breach compared to those that don't. That's exactly why you do it.
Establish Security Governance
Security without governance drifts. Put structure in place to maintain momentum:
- Monthly security reviews with IT leadership. Track metrics, review incidents, discuss emerging threats.
- Quarterly executive briefings. Keep the C-suite informed with business-language updates on risk posture and program progress.
- Annual risk reassessment. Your business changes, your threats change, and your security program needs to change with them.
- Assign a security owner. Whether it's your IT director, a virtual CISO, or a managed security provider, someone needs to be accountable for the program day-to-day.
Evaluate Your Vendor Ecosystem
By now, you should have a clear picture of which vendors have access to your environment. Phase 3 is the time to formalize your vendor security program:
- Categorize vendors by risk. Anyone with access to sensitive data or critical systems is high-risk.
- Request security documentation. SOC 2 reports, penetration test results, security questionnaires.
- Establish contractual requirements. Include security obligations and breach notification requirements in vendor agreements.
- Plan for vendor offboarding. When you end a vendor relationship, ensure all access is revoked and data is returned or destroyed.
If budget is tight, skip formal vendor assessments for now and focus on just building the inventory and revoking unnecessary access. Knowing who has the keys is more valuable than a pretty vendor risk spreadsheet nobody reads.
Measure and Report Progress
Quantify what you've accomplished. Metrics matter because they demonstrate value and justify continued investment:
- Number of vulnerabilities identified and remediated
- MFA adoption rate across the organization
- Phishing simulation click rates (trend over time)
- Mean time to detect and respond to incidents
- Number of security policies published and acknowledged
- Employee training completion rates
Present these metrics to your leadership team and board. Frame them in terms of risk reduction and business value, not just technical achievement. What gets measured gets managed, and what gets reported to the board gets funded.
Phase 3 Checklist
- Conduct a tabletop exercise with leadership team
- Document lessons learned and update incident response plan
- Establish monthly security review cadence
- Schedule quarterly executive briefings
- Assign a security program owner
- Categorize and assess vendor risk
- Compile security metrics dashboard
- Present 90-day progress report to leadership
- Draft the plan for the next 90 days
What Happens After Day 90
The sprint is over, but the work isn't. Day 91 is the beginning of your ongoing security program. The good news: you've built the foundation. You have policies, tools, training, monitoring, and governance in place. Now you iterate.
Your post-sprint priorities should include:
- Penetration testing to validate your controls against real-world attack techniques
- Compliance alignment if your industry requires frameworks like SOC 2, HIPAA, or PCI DSS
- Advanced monitoring through a managed security provider or SIEM platform
- Business continuity planning that extends beyond IT to include operations, communications, and legal
- Continuous improvement based on lessons learned, new threats, and business changes
This 90-day sprint is adapted from frameworks covered in detail in Cybersecurity for CEOs.