Foreword
Introduction
- Cybersecurity as a Leadership Issue, Not a Technical Domain
- Why This Book Exists
- The Challenge for Non-Technical Leaders
- How to Use This Book
Foundations and Security Theory for Non-Technical Leaders
- Cybersecurity Is About Risk, Not Technology
- Governance as the Foundation of Security
- Understanding Cyber Maturity
- The Role of Threat Actors and MITRE ATT&CK
- Scenario Thinking as a Leadership Skill
- Mini Case Study: When Governance Fails
Chapter 1: The Executive’s Role in Cybersecurity: What Leaders Must Own
- Cybersecurity Is a Business Decision First
- Leadership Responsibilities Defined by Global Standards
- “But I Am Not Technical” Is Not an Acceptable Limitation
- Example: The Board That Delegated Too Much
Chapter 2: How Board Members Make Cyber Decisions Without Technical Expertise
- Principle 1: Anchor All Decisions in Risk
- Principle 2: Focus on Trade Offs, Not Technical Mechanics
- Principle 3: Demand Clarity in Reporting
- Principle 4: Use Scenarios to Drive Clarity
- The Role of Risk Appetite in Cyber Decisions
- Example: The Power of Defined Appetite
- Closing
Chapter 3: Understanding Cyber Risk: A Deep Dive for Non-Technical Leaders
- The Structure of Cyber Risk
- Likelihood and Impact
- The Role of Risk Appetite
- Example: The Power of Defined Appetite
- Using This Chapter in the Boardroom
Chapter 4: Prioritization: How Leaders Decide What Matters Most in Cybersecurity
- Why Prioritization Is Difficult
- The Role of Critical Assets
- Balancing Risk Reduction and Operational Friction
- The Power and Limits of Risk Scoring
- Example: Misaligned Priorities
- Connecting Prioritization to Maturity and Strategy
Chapter 5: Cyber Governance: Building Structures That Enable Security
- Governance as a Leadership Function
- Components of a Cybersecurity Governance Model
- Building Accountability: Clear Lines of Responsibility
- Integrating Governance with Enterprise Risk Management
- Example: Strong Governance Avoids Tragedy
- Using This Chapter in the Boardroom
Chapter 6: Budgeting for Cybersecurity: Making Smart, Risk-Aligned Investments
- Why Cybersecurity Budgets Are Complex
- Linking Budget to Risk
- Understanding Cost Drivers
- A Numeric Example: Tool-Heavy Versus Team-Heavy
- Finding the Right Budget Level
- Example: Underfunding Creates Systemic Vulnerability
Chapter 7: What Boards Should Expect From a Modern CISO
- The CISO as a Business Leader
- Authority, Reporting Lines, and Independence
- What Good CISO Reporting Looks Like
- The CISO’s Role in Culture and Behaviour
- Example: The CISO Who Elevated a Company
Chapter 8: Cyber Maturity: How Executives Evaluate Progress and Weaknesses
- What Maturity Actually Measures
- Understanding the Five Classic Maturity Stages
- Interpreting Maturity for Decision Making
- Using Maturity to Guide Investments
- Example: Maturity Drives Resilience
- Using This Chapter in the Boardroom
Chapter 9: Scenario Planning: Preparing Leaders for Real-World Cyber Events
- Why Scenarios Work
- Types of Scenarios Leaders Should Use
- How Scenarios Guide Decision Making
- Designing and Running Scenario Exercises
- Example: The Exercise That Prevented a Disaster
- Using This Chapter in the Boardroom
Chapter 10: Cyber Resilience: Ensuring the Business Can Continue During Disruption
- Resilience Versus Security
- Core Elements of Resilience
- Tying Resilience to Critical Assets
- Regulatory Expectations for Resilience
- How Cyber Resilience Looks in Practice
- Example: Resilience Saves a Manufacturer
- Assessing Resilience in the Boardroom
Chapter 11: Supply Chain and Third-Party Cyber Risk: What Leaders Must Know
- Why Supply Chain Risk Is Rising
- Distinguishing Types of Third Parties
- Key Components of Third-Party Cyber Oversight
- The Role of Frameworks and Standards
- Example: Hidden Risk in an Outsourcing Partnership
- Closing Perspective
Chapter 12: Incident Response: What Executives Do During a Cyber Crisis
- Understanding the Executive Role
- The Phases of Incident Response
- Communication Under Pressure
- Balancing Business and Technical Decisions
- Example: Crisis Leadership Prevents Escalation
- Using This Chapter in the Boardroom
Chapter 13: Measuring Cybersecurity: Metrics Executives Can Trust
- What Makes a Good Cybersecurity Metric?
- Activity Metrics Versus Outcome Metrics
- Categories of Metrics That Leaders Should Track
- Metric Examples That Work for Boards
- A Narrative Example: A Quarterly Metrics Page
- Avoiding Bad Metrics
- Example: Transforming Metrics Into Insight
- Using This Chapter in the Boardroom
Chapter 14: Cyber Culture: Why People Shape the Organization’s Security More Than Technology
- Understanding Cyber Culture
- The Board’s Role in Shaping Culture
- Designing Processes That Support Secure Behavior
- Training and Awareness That Actually Change Behavior
- Encouraging Speak Up and Non Punitive Reporting
- Case Example: Culture Prevents Escalation
Chapter 15: Digital Transformation: Integrating Security Into Innovation
- Why Digital Transformation Raises Cyber Risk
- Embedding Security Into Design
- The Executive Role in Enabling Secure Innovation
- Managing Cloud and Platform Complexity
- Tying NIST SSDF to Executive Decisions
- Example: Secure Transformation as a Competitive Advantage
Chapter 16: Executive Oversight: How Boards Challenge, Validate, and Direct Cybersecurity
- The Purpose of Oversight
- Structures That Support Oversight in Practice
- Oversight Through Strategic Questions
- Oversight of Resources and Capabilities
- Oversight Cadence: What Happens When
- Example: Oversight That Prevented a Crisis
- Using This Chapter in the Boardroom
Chapter 17: Compliance, Regulation, and Legal Exposure: What Executives Must Understand
- Why Cyber Regulation Matters
- NIS2: Board Accountability for Cyber Risk
- ISO 27001: Management Systems and Leadership Commitment
- GDPR: Data Protection and Incident Handling
- DORA and Sector-Specific Financial Regulations
- Non-EU Example: SEC Cyber Disclosure Rules and NYDFS
- Legal Liability and Executive Responsibility
- Example: Compliance Failure Leads to Systemic Impact
- Using This Chapter in the Boardroom
Chapter 18: Cyber Insurance: What Leaders Need to Know About Transferring Cyber Risk
- The Purpose of Cyber Insurance
- The Changing Nature of Underwriting
- Understanding Coverage Types
- Common Exclusions and Conditions Executives Should Know
- Integrating Insurance With Cyber Governance and Controls
- Insurance and Incident Response
- Example: Insurance Reduces Financial Impact, Not Risk
- Closing Perspective
Chapter 19: Building a Cybersecurity Strategy: A Practical Framework for Executives
- Why a Cybersecurity Strategy Matters
- Foundations of a Strong Cyber Strategy
- Connecting Strategy to Risk Appetite
- Integrating Risk, Prioritization, Budget, and Maturity
- Prioritizing Strategic Initiatives
- A Three Year Strategic Horizon
- Example: Strategic Direction Enables Predictable Progress
- Using This Chapter in the Boardroom
Chapter 20: Technology Fundamentals for Non-Technical Leaders: What You Actually Need to Know
- Why Leaders Need Technology Awareness, Not Technical Skills
- Identity and Access: The Modern Security Perimeter
- Networks and Segmentation: Containing the Blast Radius
- Logging and Monitoring: Visibility Enables Response
- Backups and Recovery: The Last Line of Defence
- Cloud and Shared Responsibility
- Example: Conceptual Understanding Prevents Disaster
Chapter 21: Executive Decision Models: How Leaders Make Strong Cyber Choices Under Uncertainty
- Why Cyber Decisions Are Difficult
- The Risk - Impact - Cost Model
- The Minimum Viable Security Model
- The Scenario Readiness Model
- The Strategic Alignment Model
- Example: Decision Models Prevent Poor Investment
- Closing Perspective
Chapter 22: Implementation Roadmap: How Executives Turn Strategy Into Action
- Why Implementation Fails in Many Organizations
- Principles of an Effective Roadmap
- A Three Phase Model for Executives
- Governance and Accountability Within the Roadmap
- Example: A Roadmap That Transformed an Organization
- Closing Perspective
Chapter 23: Case Studies: Cybersecurity Decisions in Organizations
- Case Study 1: The Ransomware Crisis That Exposed Governance Gaps
- Case Study 2: The Financial Firm That Turned Cybersecurity Into a Competitive Advantage
- Case Study 3: The Manufacturer Saved by Scenario Planning
Chapter 24: Conclusion: Cybersecurity as a Permanent Leadership Discipline
- Cybersecurity Is Leadership, Not Technology
- Decision Making Requires Clarity, Not Technical Detail
- Governance, Risk Appetite, and Culture: The Core Levers
- Resilience, Scenarios, and Supply Chains: Preparing for the Inevitable
- Strategy, Roadmaps, and Technology Fundamentals
- The Future of Executive Cyber Governance
- Final Reflection: Leadership Creates Cyber Resilience
Appendix: Glossary, Framework Mappings, and Executive Checklists
- Glossary of Key Terms
- Executive Reference Tables
- Executive Checklists
- Framework Mapping: Executive Summary
- Final Executive Reflection