By taking a look at the entire network footprint from collaboration workflows that use a variety of data hand-off methods to “bring your own device” (BYOD) policies, construction executives and risk managers can better prioritize and strategize their cybersecurity efforts. This checklist will help you assess your current security posture and identify the tools, technologies and resources needed to establish a robust security program. As you go through the four categories, you may see opportunities to adjust and tighten your security controls.