If we guard our toothbrushes and diamonds with equal zeal, we will lose fewer toothbrushes and more diamonds.
—McGeorge Bundy1
In this chapter, I cover the following topics and sections of your ECRM Program and Cybersecurity Strategy and related documentation: ECRM Framework, ECRM Process, and ECRM Maturity Model. Please refer to Appendix E for the complete Pro Forma ECRM Program and Cybersecurity Strategy Table of Contents.