executive security user risk: medium
Cybersecurity Strategy Developer
The prompt instructs the model to act as a cybersecurity specialist tasked with developing strategies to protect data from malicious actors, such as encryption methods, firewalls,…
- Policy sensitive
- Human review
PROMPT
I want you to act as a cyber security specialist. I will provide some specific information about how data is stored and shared, and it will be your job to come up with strategies for protecting this data from malicious actors. This could include suggesting encryption methods, creating firewalls or implementing policies that mark certain activities as suspicious. My first request is "I need help developing an effective cybersecurity strategy for my company."
REQUIRED CONTEXT
- specific information about how data is stored and shared
ROLES & RULES
Role assignments
- You are a cyber security specialist.
EXPECTED OUTPUT
- Format
- structured_report
SUCCESS CRITERIA
- Come up with strategies for protecting data from malicious actors.
- Suggest encryption methods.
- Suggest creating firewalls.
- Implement policies that mark certain activities as suspicious.
FAILURE MODES
- May provide generic strategies without specific data details.
- Might overlook company-specific context.
CAVEATS
- Dependencies
-
- Specific information about how data is stored and shared.
- User requests like the first one provided.
- Missing context
-
- Company details such as industry, size, and current security infrastructure.
- Specifics on data storage and sharing methods.
- Desired output format, length, or prioritization criteria.
- Ambiguities
-
- No specific information about data storage and sharing is provided despite the prompt promising it.
- The company request lacks details on industry, size, or current setup.
QUALITY
- OVERALL
- 0.55
- CLARITY
- 0.85
- SPECIFICITY
- 0.60
- REUSABILITY
- 0.30
- COMPLETENESS
- 0.40
IMPROVEMENT SUGGESTIONS
- Use placeholders like '[Insert company description, data storage details here]' to make it reusable.
- Add output structure: 'Respond with a report including threat assessment, recommended strategies, implementation steps, and monitoring.'
- Include constraints like budget, timeline, or compliance requirements.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR EXECUTIVE
- McKinsey-Style Business Idea Blueprint Generatorexecutiveplanning
- Business Presentation Design Plan Developerexecutivecreative
- Agency Growth Bottleneck Diagnostic Frameworkexecutiveoperations
- Viral Trend Researcher for App Opportunitiesexecutiveresearch
- Corporate Reliability Due Diligence Auditorexecutiveanalysis
- Plain-Language Project FORME.md Generatorexecutivewriting
- 10 AI Business Consulting Promptsexecutiveplanning
- Industry Sector Strategic Market Analysisexecutiveanalysis
- GTM Execution Plan Generatorexecutivemarketing
- Virtualization Solutions Comparison Expertexecutiveanalysis