Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Cumulative Effect - Vladas Leonas

Cumulative Effect

Cyber Security Guide for Directors and CEOs

(Autor)

Buch | Hardcover
240 Seiten
2026
CRC Press (Verlag)
978-1-041-22073-2 (ISBN)
CHF 189,95 inkl. MwSt
  • Noch nicht erschienen (ca. Mai 2026)
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
Historically, cyber security was always a “poor relation” in the eyes of the majority of Boards and CEOs, considered inferior, less important, or not as well-regarded as other issues or compared to them and treated as an annoying cost centre requiring more and more money that could potentially have been spent “better” elsewhere. This is a result of inertia, a cumulative effect of multiple factors and, more importantly, a lack of understanding of how the landscape has changed in the last 25 or so years.

So, what can Board Members and CEOs do to improve the organisation’s cyber security posture? They can do a lot of things!

To start with, they need to recognise and acknowledge the inherent insecurities of the Internet, on which organisations’ business is built today. By doing this, they will start thinking in the right direction (e.g., “we live and operate in a high-crime area”). They may start focusing on the strength of the domain/subdomain and certificate management processes and ensure that they are bullet-proof.

Secondly, they can look at expanding the organisation’s KPI to include cyber security with carefully and correctly selected KPIs (like, for example, year-on-year decrease in the complexity of the organisation’s IT ecosystem). They can also consider their approach to the use of unmanaged by the organisation devices (like BYOD devices and home computers).

Thirdly, they can have an additional lens to look at the business cases by introducing “cyber security risk-reward” analysis (oh, isn’t this just another KPI?). This will help with the way they look at the digital revolution. It will also enable looking at the agile approach from a different angle, and, possibly, reconsider its use. It will also help with the containment of the SaaS sprawl and shadow IT.

Then, they can ensure that the organisation has a full understanding of the shared security responsibility concept and ensures its correct implementation and management.

Another area they can impact is understanding (and management!) of the supply chain cyber security risks (and dependencies!) across all (not only IT!) vendors and service providers. They may put more attention to who (and how) is managing the organisation’s DNS and what cyber risks this poses to the organisation. This may also push them to start thinking about the organisation’s commitment to the use of the “digital monopolies” (like, for example, Microsoft or CrowdStrike).

They may at last recognise that Compliance ≠ Security and that as much as a proper implementation of the chosen standard(s) and framework(s) may (or may not) improve an organisation’s cyber security posture, it does not offer any guarantees about the actual cyber security posture of the organisation.

Finally, they may get out of the fear of missing out (FOMO) trap and start looking at AI adoption through a cyber security risks lens and start thinking about and planning the implementation of post-quantum cryptography.

This book is an attempt to be a “wake-up call” and a call to action.

Dr Vladas Leonas entered ICT during the mainframe and punched cards era and witnessed first-hand the emergence and proliferation of mini-, micro- and personal computers and networks. Throughout his career, he has worked in multiple public and private sector industries and tertiary education organisations. He is a Fellow of ACS, a Fellow of IEAust and a formally trained auditor (ISO/IEC 27001). He is also an Adjunct Professor at the Australian Graduate School of Leadership. Dr Vladas Leonas is a subject matter expert and specialises in ICT Strategies, their Implementation and ICT Operations, Gateway Reviews and Internal Audits, Enterprise Risk Management, Cybersecurity, Governance, Procurement and Compliance. Over the last 25 years, he has held eight CIO and CTO positions.

Introduction. Personal Liability and Cyber Insurance. Chapter 1. Cumulative Effect. Chapter 2. CIA, Risk Appetite and Risk Exposure. Chapter 3. The Fifth Column. Chapter 4. Complexity Tax. Chapter 5. Digital Revolution (And Its Consequences). Chapter 6. Agile Curse. Chapter 7. Cloud: Who Owns the Breach? Chapter 8. SaaS Sprawl. Chapter 9. Supply Chain Challenges. Chapter 10. The Fifth Column Just Got Bigger - Internet Protocols. Chapter 11. Compliance ≠ Security. Chapter 12. Standards And Frameworks. Chapter 13. Tyranny of KPIs. Chapter 14. Gone Phishing. Chapter 15. Emerging Threats. Conclusion.

Erscheint lt. Verlag 1.5.2026
Reihe/Serie Security, Audit and Leadership Series
Zusatzinfo 2 Tables, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Wirtschaft Betriebswirtschaft / Management
ISBN-10 1-041-22073-1 / 1041220731
ISBN-13 978-1-041-22073-2 / 9781041220732
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95