Implementation method

Step 1
Audit the cybersecurity system according to international standards such as ISO27001, PCI-DSS, SWIFT, etc
Step 2
Audit the network, servers, databases according to widely recognized guidance such as CIS, NIST, etc
Step 3
Ensure the legal requirements and compliance to international standards.

Results

General goals and scopes
Summarization of approaching and performing methodologies
Summarization of existing vulnerabilities and evaluation of respective impacts