How to develop a business-oriented cybersecurity strategy?