-
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness. -
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity and digital privacy Digital ArticleFour steps to building a company culture that reinforces your IT initiatives. -
How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now
Technology & Operations Digital ArticleScams and attacks have become more frequent and sophisticated as the crisis unfolds. -
What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Cybersecurity and digital privacy Digital ArticleAnd how organizations around the world can prepare -
Sizing Up Your Cyberrisks
Boards Magazine ArticleFocus first on the threats to your key activities—not on the technology itself. -
Quantum Computing for Business Leaders
Technology & Operations Magazine ArticleQuantum computers can solve problems exponentially faster than classical computers can. They will bring about two huge changes: an end to our current... -
Is Third-Party Software Leaving You Vulnerable to Cyberattacks?
Cybersecurity and digital privacy Digital ArticleThe SolarWinds hack highlights the importance of vetting your vendors. -
Is Your Board Prepared for New Cybersecurity Regulations?
IT security management Digital ArticleA proposed SEC rule would require companies to disclose their cybersecurity governance capabilities. -
Why Companies Are Forming Cybersecurity Alliances
Cybersecurity and digital privacy Digital ArticleThey’re stepping up where governments haven’t. -
Cybersecurity Insurance Has a Big Problem
Strategy & Execution Digital ArticleThere's literally not enough money to keep the system afloat in the event of a major attack. -
Cyberattacks Are Inevitable. Is Your Company Prepared?
Technology & Operations Digital ArticleThe first time you test your plan shouldn't be during a crisis. -
Does Your Cyber Insurance Cover a State-Sponsored Attack?
Crisis management Digital ArticleDecisions you make today will determine whether you’re facing financial chaos — or just a bad day at the office. -
What It Takes to Sell Cloud-Based Software to the U.S. Government
Technology & Operations Digital ArticleComplying with FedRAMP is worth the investment. -
New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?
Cybersecurity and digital privacy Digital ArticleThe consequences of weak security are about to go way beyond bad PR. -
The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict
Technology & Operations Digital ArticleNow is the time to revisit your business continuity plans. -
Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready?
Technology & Operations Digital ArticlePlatforms have a propaganda problem. -
Raytheon CEO Gregory Hayes: How Ukraine Has Highlighted Gaps in US Defense Technologies
Business and society Digital ArticleHow does a company that gets two million hack attempts each week think about security? -
7 Pressing Cybersecurity Questions Boards Need to Ask
IT security management Digital ArticleDon’t leave concerns about critical vulnerabilities for tomorrow. -
Don’t Acquire a Company Until You Evaluate Its Data Security
Cybersecurity and digital privacy Digital ArticleBeware the “data lemon.” -
How to Safeguard Against Cyberattacks on Utilities
Decision making and problem solving Digital ArticleIn 2019, California showed us how costly a sustained power outage can be.
-
Hydropack India Pvt. Ltd.: Resolving a Data Breach
Technology & Operations Case Study8.95View Details In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology... -
Everybody Knows: Russia and the Election, Chinese Version
Global Business Case Study15.05View Details Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Security Breach at TJX
Technology & Operations Case Study8.95View Details The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer... -
iPremier (A): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study8.95View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study8.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
PopVote: Assessing the Risk of DDoS (A)
Technology & Operations Case Study8.95View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
Avalon Information Services, Inc.
Sales & Marketing Case Study8.95View Details The Privacy Review Committee of Avalon Information Services must decide how to deal with concerns voiced by its retail supermarket customers about the... -
Mossack Fonseca: Panama Papers
Technology & Operations Case Study8.95View Details Mossack Fonseca, a Panama-based law firm, specializes in Corporate Law, fiduciary services, investment advice, and international business. In April 2016,... -
iPremier (B): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Innovation & Entrepreneurship Case Study8.95View Details This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through... -
HBR Insights Future of Business Boxed Set (8 Books)
Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future...
-
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness. -
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity and digital privacy Digital ArticleFour steps to building a company culture that reinforces your IT initiatives. -
Hydropack India Pvt. Ltd.: Resolving a Data Breach
Technology & Operations Case Study8.95View Details In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology... -
Everybody Knows: Russia and the Election, Chinese Version
Global Business Case Study15.05View Details Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Security Breach at TJX
Technology & Operations Case Study8.95View Details The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer... -
How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now
Technology & Operations Digital ArticleScams and attacks have become more frequent and sophisticated as the crisis unfolds. -
iPremier (A): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study8.95View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Cybersecurity and digital privacy Digital ArticleAnd how organizations around the world can prepare -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study8.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control...