Cybersecurity (CS) is among the most critical issues facing organizations today. The role of cybersecurity in the pursuit of organizational mission, while currently underappreciated, is likely to become more evident in the future. This presentation examines the organizational, environmental, and contextual aspects of cybersecurity and explores how organizations can acquire, deploy, and develop resources and capabilities to prepare themselves for the changing cybersecurity environment. In doing so, it gives special consideration to strategic management from the cybersecurity perspective, which involves matching an organization’s resources and capabilities with the changing cybersecurity environment in the most advantageous way. It covers the formulation of the organization's cybersecurity objectives and goals, and engagement in implementation and control of decisions and actions that can help achieve these objectives and goals. It presents a conceptual framework delineating the drivers and outcomes of cybersecurity strategy. It provides information on which to build a comprehensive cybersecurity strategy to minimize and prevent cyber-attack risks facing a company, as it examines the corporate cybersecurity environment within the larger context of data-driven decision and increasing cyber-security risks. I classify cyber-threats in terms of various dimensions such as capabilities and motivations of the attacker, potential consequences to the victim organization, relationship with actions and positions of the target and the time-variance relation. It also examines the relevance and limitations of various types of resources in the context of cybersecurity and articulates processes by which internal and market-based resources can be improved and redeployed in order to strengthen cybersecurity and convert into competitive advantages in the big data era. The presentation also introduces the first principle of CS, which involves reducing the cyber-vulnerability and minimizing the potential negative consequences if the firm faces cyber-attacks. Key determinants of vulnerability and consequences are discussed.