Overview of Bandler's DIY Cybersecurity Program and ResourcesLearn, Build, Maintain Bandler’s Cybersecurity Program Yourself

By John Bandler

In this page we provide an overview of my do-it-yourself cybersecurity program and the resources I provide.

This is for small and very small organizations to build my cybersecurity program themselves.

This assumes they have no program at all, are starting from zero, and lack resources to hire expertise.

I talk this overview through in the video embedded below.

1. Start from scratch and build your cybersecurity program (DIY)Start with nothing (at zero) and build Bandler’s Cybersecurity Program Yourself (DIY)

If your organization has no cybersecurity program or policy, you need to build it.

That will involve implementing my free written cybersecurity policy, understanding and following it, establishing management, and training.

If you follow my steps with good faith reasonable diligence, devoting sufficient, reasonable time and effort, then you have now built your cybersecurity program.Build Bandler’s Cybersecurity Program Yourself infographic by John Bandler https://johnbandler.com/build-bandlers-cybersecurity-program-yourself/

You have done something, which is much better than nothing.

My other article (and companion video) outlines those main steps.

After building, then it becomes time to maintain and improve it (next step).

2. Improve your existing implementation of Bandler's Cybersecurity Program (DIY)Improve Your Existing Implementation of Bandler’s DIY Cybersecurity Program

Cybersecurity is a process of continual improvement, you can never stop.

This means periodic review, looking for improvements, continuing training, and more.

It takes years to build a culture of good management for your cybersecurity program and information systems.

My other article (and companion video) outline what to do here.

3. Yes, DIY is possible

Yes, you can do this. DIY is possible. Every organization needs an effective cybersecurity program, that is clear.

Many organizations are small and with limited resources, they do not have a full time information security employee, much less a chief information security officer (CISO) with staff. Most organizations don't even have a full time information technology employee. Some cannot afford to hire an expert.

But yet they still need to manage their information technology and security, even and especially as they hire outside vendors for IT related services.

My resources on this website will help you, and also my 2017 book, and my future book on cybersecurity (coming 2026 I hope).

4. Appreciate my free resources?

If you appreciate the free resources I am providing, please consider the thoughts in my article Give Forward or Give Back.

5. My services

If you need help, I offer services to help get you going and move you forward. Hourly consultation or a flat fee guided implementation. You can get some basics in place and done, including (1) documentation, (2) initial training, (3) high priority initial improvements.

6. Disclaimers and terms

See all my disclaimers and terms on my free cybersecurity policy and for this website.

Summarized briefly: Information governance, cybersecurity, cybercrime protection, and compliance is challenging. You assume all risks, I have no liability, I retain all of my intellectual property rights.

This DIY method is exactly what it is, and no more. It is a DIY method to build your own cybersecurity program, recognizing that many small organizations lack the resources for professional assistance, even for an hourly consult. This is not a magic, effortless solution, nor is it a substitute for expertise in information technology and cybersecurity.

This is my gift to you, you agree not to sue me no matter what harms befall you, and you might even give back.

7. Additional links

This page is hosted at https://johnbandler.com/overview-bandlers-diy-cybersecurity-program. Copyright John Bandler, all rights reserved.

Page posted 11/08/2025. Updated 12/12/2025