CS
CyberStrategy Workbench
Security Leadership Planning Suite
v2.0 · 2026
90-Day Plan
Stakeholders
Roadmap
Policy Builder
Exec Brief
90-Day Strategic Plan
Build your CISO onboarding or program reset roadmap across three phases.
↓ Export Plan
🏢
Organization Context
Organization Name
Your Role / Title
Primary Security Mandate
Start Date
DAYS 01–30
Learn & Listen
👥 People
⚙️ Process
🖥️ Technology
🏛️ Governance
DAYS 31–60
Assess & Align
👥 People
⚙️ Process
🖥️ Technology
🏛️ Governance
DAYS 61–90
Act & Deliver
👥 People
⚙️ Process
🖥️ Technology
🏛️ Governance
Generated Plan
⎘ Copy to Clipboard
Stakeholder Matrix
Map influence and interest to define your engagement strategy.
+ Add Stakeholder
+
New Stakeholder
Name
Title / Role
Department
Influence Level
High
Medium
Low
Interest in Security
High
Medium
Low
Disposition
Champion
Supporter
Neutral
Skeptic
Blocker
Engagement Strategy
Add Stakeholder
Cancel
Table View
2×2 Matrix
Name
Role
Department
Influence
Interest
Disposition
Strategy
👥
Add stakeholders to begin mapping your engagement landscape.
Power / Interest Matrix
INFLUENCE →
Monitor — Low Interest, High Influence
Manage Closely — High Interest, High Influence
Monitor — Low Interest, Low Influence
Keep Informed — High Interest, Low Influence
INTEREST →
Security Roadmap
Prioritize initiatives by risk, impact, and feasibility. Build your gap-to-action plan.
+ Add Initiative
+
New Initiative
Initiative Title
Category
Identity & Access
Threat Detection
Vulnerability Management
Data Protection
Cloud Security
AI/ML Security
Governance & Compliance
Incident Response
Security Awareness
Third-Party Risk
Network Security
Priority
Critical
High
Medium
Low
Timeline
Q1 2026
Q2 2026
Q3 2026
Q4 2026
H1 2027
H2 2027
2028+
Estimated Effort
Low (< 1 month)
Medium (1–3 months)
High (3–6 months)
Very High (6+ months)
Business Justification
Description
Add Initiative
Cancel
Initiative List
SWOT Analysis
🗺️
Add security initiatives to build your strategic roadmap.
💪 Strengths
+
⚠️ Weaknesses
+
🚀 Opportunities
+
🔥 Threats
+
Policy Builder
Generate structured security policies tailored to your organization.
📋
Select Policy Template
🔍
Vulnerability Management
Scanning, disclosure, and remediation timelines
☁️
Cloud Security
Cloud usage standards, configuration, and access
🤖
AI Security
Acceptable use of AI tools and governance
🔑
Access Control
Identity, authentication, and least privilege
🚨
Incident Response
Detection, escalation, and response procedures
🗄️
Data Classification
Data handling, labeling, and protection standards
🏢
Policy Details
Organization Name
Policy Owner
Version
Review Cycle
Annual
Semi-Annual
Quarterly
Compliance Framework (optional)
None specified
NIST CSF
ISO 27001
SOC 2
HIPAA
PCI DSS
CIS Controls
Scope
⚡ Generate Policy Document
Policy Output
⎘ Copy
📄
Select a template and fill in the details, then click Generate.
Executive Brief
Synthesize your strategy into a board-ready security summary.
⚡ Generate Brief
📊
Security Metrics
Security Program Maturity (1–5)
Critical Vulnerabilities Open
MFA Coverage (%)
Policy Compliance (%)
Mean Time to Detect (hours)
Security Training Completion (%)
💬
Narrative Input
Top 3 Security Risks (comma separated)
Key Achievements This Period
Investment Request (optional)
Executive Brief Output
⎘ Copy
📋
Fill in the metrics and narrative, then click Generate Brief.
✓ Copied to clipboard