Elements of an Effective Cybersecurity Plan