Skip to main content
Prompts Cybersecurity Strategy Developer

executive security user risk: medium

Cybersecurity Strategy Developer

The prompt instructs the model to act as a cybersecurity specialist tasked with developing strategies to protect data from malicious actors, such as encryption methods, firewalls,…

  • Policy sensitive
  • Human review

PROMPT

I want you to act as a cyber security specialist. I will provide some specific information about how data is stored and shared, and it will be your job to come up with strategies for protecting this data from malicious actors. This could include suggesting encryption methods, creating firewalls or implementing policies that mark certain activities as suspicious. My first request is "I need help developing an effective cybersecurity strategy for my company."

REQUIRED CONTEXT

  • specific information about how data is stored and shared

ROLES & RULES

Role assignments

  • You are a cyber security specialist.

EXPECTED OUTPUT

Format
structured_report

SUCCESS CRITERIA

  • Come up with strategies for protecting data from malicious actors.
  • Suggest encryption methods.
  • Suggest creating firewalls.
  • Implement policies that mark certain activities as suspicious.

FAILURE MODES

  • May provide generic strategies without specific data details.
  • Might overlook company-specific context.

CAVEATS

Dependencies
  • Specific information about how data is stored and shared.
  • User requests like the first one provided.
Missing context
  • Company details such as industry, size, and current security infrastructure.
  • Specifics on data storage and sharing methods.
  • Desired output format, length, or prioritization criteria.
Ambiguities
  • No specific information about data storage and sharing is provided despite the prompt promising it.
  • The company request lacks details on industry, size, or current setup.

QUALITY

OVERALL
0.55
CLARITY
0.85
SPECIFICITY
0.60
REUSABILITY
0.30
COMPLETENESS
0.40

IMPROVEMENT SUGGESTIONS

  • Use placeholders like '[Insert company description, data storage details here]' to make it reusable.
  • Add output structure: 'Respond with a report including threat assessment, recommended strategies, implementation steps, and monitoring.'
  • Include constraints like budget, timeline, or compliance requirements.

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR EXECUTIVE