The cybersecurity landscape is complex, and the threats posed to public power are real. Cyberattacks range in magnitude and impact and can occur in many forms, such as phishing attacks through employees' emails and gaining backdoor access to a utility's IT network through third-party vendors. These threats originate from a spectrum of malicious sources, ranging from individual actors to foreign powers seeking to disrupt critical infrastructure. The below roadmap is designed in EdrawMax, and it is highly customizable that lets the user design it as per the need. Team members can easily be designated into teams by accessing the work milestones within the timeframe.