Cybersecurity strategy: how to tackle risks step by step