Get Free Shipping on orders over $79
Cumulative Effect : Cyber Security Guide for Directors and CEOs - Vladas Leonas

Cumulative Effect

Cyber Security Guide for Directors and CEOs

By: Vladas Leonas

Hardcover | 9 April 2026 | Edition Number 1

At a Glance

Hardcover


$404.75

or 4 interest-free payments of $101.19 with

 or 

Available: 9th April 2026

Preorder. Will ship when available.

Historically, cyber security was always a âpoor relationâ in the eyes of the majority of Boards and CEOs, considered inferior, less important, or not as well-regarded as other issues or compared to them and treated as an annoying cost centre requiring more and more money that could potentially have been spent âbetterâ elsewhere. This is a result of inertia, a cumulative effect of multiple factors and, more importantly, a lack of understanding of how the landscape has changed in the last 25 or so years.

So, what can Board Members and CEOs do to improve the organisationâs cyber security posture? They can do a lot of things!

To start with, they need to recognise and acknowledge the inherent insecurities of the Internet, on which organisationsâ business is built today. By doing this, they will start thinking in the right direction (e.g., âwe live and operate in a high-crime areaâ). They may start focusing on the strength of the domain/subdomain and certificate management processes and ensure that they are bullet-proof.

Secondly, they can look at expanding the organisationâs KPI to include cyber security with carefully and correctly selected KPIs (like, for example, year-on-year decrease in the complexity of the organisationâs IT ecosystem). They can also consider their approach to the use of unmanaged by the organisation devices (like BYOD devices and home computers).

Thirdly, they can have an additional lens to look at the business cases by introducing âcyber security risk-rewardâ analysis (oh, isnât this just another KPI?). This will help with the way they look at the digital revolution. It will also enable looking at the agile approach from a different angle, and, possibly, reconsider its use. It will also help with the containment of the SaaS sprawl and shadow IT.

Then, they can ensure that the organisation has a full understanding of the shared security responsibility concept and ensures its correct implementation and management.

Another area they can impact is understanding (and management!) of the supply chain cyber security risks (and dependencies!) across all (not only IT!) vendors and service providers. They may put more attention to who (and how) is managing the organisationâs DNS and what cyber risks this poses to the organisation. This may also push them to start thinking about the organisationâs commitment to the use of the âdigital monopoliesâ (like, for example, Microsoft or CrowdStrike).

They may at last recognise that Compliance â  Security and that as much as a proper implementation of the chosen standard(s) and framework(s) may (or may not) improve an organisationâs cyber security posture, it does not offer any guarantees about the actual cyber security posture of the organisation.

Finally, they may get out of the fear of missing out (FOMO) trap and start looking at AI adoption through a cyber security risks lens and start thinking about and planning the implementation of post-quantum cryptography.

This book is an attempt to be a âwake-up callâ and a call to action.

More in Business & Management

Riding the Unicorn : The Startup Guide You'll Want to Read - Wenee Yap
The Narrative Edge : Authentic Storytelling that Meets the Moment - Rod Berger
Outwitting the Devil® : The Secret to Freedom and Success - Napoleon Hill
The Infinite Game : From the bestselling author of Start With Why - Simon Sinek