The Digital Battlefield is a Leadership Test


I used to think cybersecurity was about code.

Firewalls. Encryption. Penetration testing. The domain of IT departments and security teams who speak in acronyms most people never bothered to learn.

I was wrong.

After spending years working in cybersecurity and writing about character-driven leadership, about integrity, about the invisible work of becoming someone worth following, I discovered something that changed how I see protection entirely.

Cybersecurity is 10% technology and 90% people.

The moment that truth sank in, I realized I hadn’t been writing two separate books. I had been writing two halves of the same story.

The Blanket Fort Promise

When I started this newsletter, I called it “Blanket Fort Reads” because I wanted to create a space away from the noise. A place where busy leaders could find clarity. Where complex ideas about character and influence could become actionable.

A blanket fort represents safety. Imagination. A protected space where you can think clearly.

But here’s what I’ve learned: you cannot build a blanket fort if you don’t know who’s trying to tear it down.

If you lead a team, a company, or a family, you are a protector. And protectors need to understand not just the interior work of character, but the exterior threats that target the people they love.

This is why I wrote The Digital Backdoor.

The Realization

Let me tell you about the moment everything clicked.

I was deep in research about supply chain attacks. These are breaches where hackers don’t attack you directly. They attack the vendors you trust. The software you install. The partners you invite inside your walls.

In December 2020, Russian intelligence operatives compromised a company called SolarWinds. They didn’t target the Fortune 500 companies or government agencies they wanted to infiltrate. They inserted malicious code into routine software updates that SolarWinds then distributed to approximately 18,000 organizations.

The victims received the attack through the same update mechanisms they relied on for security patches. The malware looked completely legitimate because it came from a source they had learned to trust.

Every security control designed to verify authenticity said this was safe.

It wasn’t.

I remember reading the case study and feeling something shift inside me. This wasn’t a story about clever code or sophisticated hackers. This was a story about trust. About relationships. About what happens when we extend access to people we don’t truly know and don’t verify.

Someone made a decision. Someone trusted when they should have verified. Someone panicked when they should have stayed calm. Someone failed to lead.

Every breach has a human element at its center.

And suddenly, I understood: the protocols in any security manual will fail if the leader executing them lacks the character to make hard decisions under pressure.

Verification checklists become worthless when panic overrides judgment. Response plans collapse when the person in charge cannot maintain composure during a crisis.

This wasn’t separate from my work on character.

This was the application of it.

The Bridge

In The Heart of Influence, I wrote about what I call “the gap,” the distance between the person we want to be and the person we actually are.

Most of us try to close that gap through external solutions. Better techniques. More strategies. The latest productivity system.

But the gap isn’t a knowledge problem. It’s a formation problem. A problem of the heart.

The same pattern appears in security.

Organizations invest in massive firewalls, sophisticated monitoring tools, and expensive certifications. They build what looks like an impenetrable fortress.

Then they leave the back door wide open.

Not because they don’t have the right tools. But because they trust vendors without verifying them. Because they prioritize convenience over vigilance. Because when the crisis comes, no one has cultivated the composure to respond with integrity.

Here’s the uncomfortable truth I share in The Digital Backdoor:

You can implement every security control perfectly and still get breached because someone you trusted didn’t.

Your vendors have their own vendors. Those vendors have vendors. Each link in that chain is a relationship built on trust, and that trust may or may not be warranted.

Supply chain attacks affected over 10 million people globally in 2023. The costs rose from $46 billion in 2020 to a projected $138 billion by 2031.

And the common thread in almost every incident? The human element.

The Blanket Fort Insight

My 7-yo son once wrote a letter to Santa asking for a hardcover copy of Daddy’s book.

He didn’t know the manuscript was only half-finished when he wrote that. He didn’t know I was exhausted and doubting whether any of this would ever see print.

But his belief in me became the fuel that pushed me forward. When motivation faltered, I thought of him holding something real that his father had made.

My 12-yo daughter is an avid reader. She devours books faster than I can keep up. I wrote with the hope that one day, when she’s older, she’ll pull one of my books off the shelf and feel proud that her father built something worth keeping.

This is what protection means to me.

It’s not abstract. It’s not theoretical. It’s the people in my home. The team I lead at work. The readers who trust me to give them clarity in chaos.

And in a world of hackers, breaches, and invisible threats that travel through the vendors you invite inside your walls, the only true defense is a leader with integrity and vigilance.

Character alone won’t stop a breach. But character is what enables you to verify when others would trust blindly. To hold the line when panic tells you to cut corners. To deliver hard news without flinching. To absorb bad outcomes and keep moving forward.

Crisis management requires integrity when no one is watching.

These qualities cannot be downloaded from a compliance framework. They must be cultivated deliberately over time.

The Heart of Influence is the guide for building the internal foundation.

The Digital Backdoor is the field manual for protecting what that foundation was built to serve.

The Promise

Going forward, Blanket Fort Reads will cover both.

The character to lead. And the tactical knowledge to survive.

This isn’t a departure from what I’ve always written about. It’s the completion of it.

You cannot be a protector if you leave the back door open to threats. You cannot exercise the vigilance required for security without first developing the composure, integrity, and discernment that only come from doing the deep work of character.

The digital battlefield is a leadership test.

And the leaders who pass that test aren’t the ones with the biggest budgets or the most sophisticated tools. They’re the ones who’ve done the invisible work of becoming someone who can make hard decisions under pressure. They’ve learned that trust without verification is not trust at all.

It’s hope. And hope is a strategy for the unprepared.

So here’s what I’m asking you to consider:

  • What doors have you left open because verifying them felt inconvenient?
  • What vendors do you trust simply because you’ve always trusted them?
  • And when the crisis comes, because it will come, do you have the character to lead through it?

The Heart of Influence teaches you to secure the leader.

The Digital Backdoor teaches you to secure the network.

You need both.

Welcome to the real work of protection.


Julio Bandeira de Melo is a Cybersecurity Leader specializing in Supply Chain and Third-Party Risk. He is the author of The Heart of Influence and The Digital Backdoor. He writes from the intersection of security and humanity. Subscribe to Blanket Fort Reads for clarity in chaos.