Overview of Bandler's DIY Cybersecurity Program and ResourcesLearn, Build, Maintain Bandler’s Cybersecurity Program Yourself

By John Bandler

In this page we provide an overview of my do-it-yourself cybersecurity program and the resources I provide.

This is for small and very small organizations to build my cybersecurity program themselves.

This assumes they have no program at all, are starting from zero, and lack resources to hire expertise.

I talk this overview through in the video embedded below.

Why

  • Every organization needs a cybersecurity program to protect from cybercrime, comply with laws, and accomplish the mission.
  • Organizations without a cybersecurity program risk falling victim to cybercrime, or being accused of having negligent and sloppy cybersecurity.
  • Organizations, no matter the size or type, need to do something about cybersecurity. It can't be nothing, because doing nothing is negligent.
  • This system gives every organization a mechanism to do something, even if they lack internal expertise or funds to hire external experts.

1. Start from scratch and build your cybersecurity program (DIY)Start with nothing (at zero) and build Bandler’s Cybersecurity Program Yourself (DIY)

If your organization has no cybersecurity program or policy, you need to build it.

That will involve implementing my free written cybersecurity policy, understanding and following it, establishing management, and training.

If you follow my steps with good faith reasonable diligence, devoting sufficient, reasonable time and effort, then you have now built your cybersecurity program.Build Bandler’s Cybersecurity Program Yourself infographic by John Bandler https://johnbandler.com/build-bandlers-cybersecurity-program-yourself/

You have done something, which is much better than nothing.

My other article (and companion video) outlines those main steps.

After building, then it becomes time to maintain and improve it (next step).

2. Improve your existing implementation of Bandler's Cybersecurity Program (DIY)Improve Your Existing Implementation of Bandler’s DIY Cybersecurity Program

Cybersecurity is a process of continual improvement, you can never stop.

This means periodic review, looking for improvements, continuing training, and more.

It takes years to build a culture of good management for your cybersecurity program and information systems.

My other article (and companion video) outline what to do here.

3. Yes, DIY is possible

Yes, you can do this. DIY is possible. Every organization needs an effective cybersecurity program, that is clear.

Many organizations are small and with limited resources, they do not have a full time information security employee, much less a chief information security officer (CISO) with staff. Most organizations don't even have a full time information technology employee. Some cannot afford to hire an expert.

But yet they still need to manage their information technology and security, even and especially as they hire outside vendors for IT related services.

My resources on this website will help you, and also my 2017 book, and my future book on cybersecurity (coming 2026 I hope).

4. Appreciate my free resources?

If you appreciate the free resources I am providing, please consider the thoughts in my article Give Forward or Give Back.

5. My services

If you need help, I offer services to help get you going and move you forward to include:

  • Hourly consultation, or
  • Flat fee guided implementation where we can get some basics in place and done, including (1) documentation, (2) initial training, (3) high priority initial improvements.

6. The goals (why)

Your three main goals, and why you need a cybersecurity program, include to (1) protect from cybercrime, (2) comply with legal requirements, and (3) accomplish the mission better. (More in my video and article linked below).

Cybersecurity and a solid cybersecurity program is needed by every organization, to a reasonable degree.

7. Disclaimers and terms

See all my disclaimers and terms on my free cybersecurity policy and for this website.

Summarized briefly: Information governance, cybersecurity, cybercrime protection, and compliance is challenging. You assume all risks, I have no liability, I retain all of my intellectual property rights.

This DIY method is exactly what it is, and no more. It is a DIY method to build your own cybersecurity program, recognizing that many small organizations lack the resources for professional assistance, even for an hourly consult. This is not a magic, effortless solution, nor is it a substitute for expertise in information technology and cybersecurity.

This is my gift to you, you agree not to sue me no matter what harms befall you, and you might even give back.

8. Additional links

This page is hosted at https://johnbandler.com/overview-bandlers-diy-cybersecurity-program. Copyright John Bandler, all rights reserved.

Page posted 11/08/2025. Updated 01/29/2026