Overview of Bandler's DIY Cybersecurity Program and Resources
By John Bandler
In this page we provide an overview of my do-it-yourself cybersecurity program and the resources I provide.
This is for small and very small organizations to build my cybersecurity program themselves.
This assumes they have no program at all, are starting from zero, and lack resources to hire expertise.
I talk this overview through in the video embedded below.
1. Start from scratch and build your cybersecurity program (DIY)
If your organization has no cybersecurity program or policy, you need to build it.
That will involve implementing my free written cybersecurity policy, understanding and following it, establishing management, and training.
If you follow my steps with good faith reasonable diligence, devoting sufficient, reasonable time and effort, then you have now built your cybersecurity program.
You have done something, which is much better than nothing.
My other article (and companion video) outlines those main steps.
After building, then it becomes time to maintain and improve it (next step).
2. Improve your existing implementation of Bandler's Cybersecurity Program (DIY)
Cybersecurity is a process of continual improvement, you can never stop.
This means periodic review, looking for improvements, continuing training, and more.
It takes years to build a culture of good management for your cybersecurity program and information systems.
My other article (and companion video) outline what to do here.
3. Yes, DIY is possible
Yes, you can do this. DIY is possible. Every organization needs an effective cybersecurity program, that is clear.
Many organizations are small and with limited resources, they do not have a full time information security employee, much less a chief information security officer (CISO) with staff. Most organizations don't even have a full time information technology employee. Some cannot afford to hire an expert.
But yet they still need to manage their information technology and security, even and especially as they hire outside vendors for IT related services.
My resources on this website will help you, and also my 2017 book, and my future book on cybersecurity (coming 2026 I hope).
4. Appreciate my free resources?
If you appreciate the free resources I am providing, please consider the thoughts in my article Give Forward or Give Back.
5. My services
If you need help, I offer services to help get you going and move you forward. Hourly consultation or a flat fee guided implementation. You can get some basics in place and done, including (1) documentation, (2) initial training, (3) high priority initial improvements.
6. Disclaimers and terms
See all my disclaimers and terms on my free cybersecurity policy and for this website.
Summarized briefly: Information governance, cybersecurity, cybercrime protection, and compliance is challenging. You assume all risks, I have no liability, I retain all of my intellectual property rights.
This DIY method is exactly what it is, and no more. It is a DIY method to build your own cybersecurity program, recognizing that many small organizations lack the resources for professional assistance, even for an hourly consult. This is not a magic, effortless solution, nor is it a substitute for expertise in information technology and cybersecurity.
This is my gift to you, you agree not to sue me no matter what harms befall you, and you might even give back.
7. Additional links
- Overview of Bandler's DIY cybersecurity program (this article)
- Next: Video: What is Bandler's Cybersecurity Program (in 6 minutes)
- Next: Build Bandler's cybersecurity program yourself
- See my Bandler Cybersecurity Program DIY program video course either on YouTube or Udemy
- All of my Bandler Cybersecurity Program DIY webpages here (videos embedded at bottom of each page)
- Build Your Cybersecurity Program
- Bandler's cybersecurity program
- Cybersecurity program
- Cybersecurity Services
- Introduction to Cybersecurity and Information Security
- Bandler's Four Pillars of Cybersecurity
- Cybersecurity Tips From John Bandler
- Cybersecurity Policy (Free Version)
- Cybersecurity things to know
- Policies and Procedures Book
- Cyberlaw book
- Cybersecurity for attorneys (course outline)
- Cybersecurity and Cybercrime Prevention (course outline)
- Cybersecurity course at Udemy
- Key terms definitions
This page is hosted at https://johnbandler.com/overview-bandlers-diy-cybersecurity-program. Copyright John Bandler, all rights reserved.
Page posted 11/08/2025. Updated 12/12/2025
