This resource is a set of checklists that attempt to list all of the possible information security steps an organization can take to protect itself. It breaks these steps into the smallest atoms of action required to complete them.
The overall goal of the resource is to support security trainers to produce an easy-to-use action plan that is customized and approachable for organizations.