Filter Results:
(18)
Show Results For
- All HBS Web
(18)
- News (7)
- Research (8)
- Multimedia (1)
- Faculty Publications (6)
Show Results For
- All HBS Web
(18)
- News (7)
- Research (8)
- Multimedia (1)
- Faculty Publications (6)
Page 1 of 18
Results
- October 2022
- Background Note
Note on Cyberattacks and Regulatory Regimes
Describes common types of cyberattacks on enterprises and their costs, as well as the fragmentary regulatory regimes through which U.S. states and regulatory agencies at the start of 2021 attempted to encourage disclosure of cyberattacks and to pursue enforcement... View Details
Keywords: Regulations; Regulatory Agencies; Cyberattacks; Governance; Corporate Disclosure; Cybersecurity; Information Industry; Information Technology Industry; Health Industry; Financial Services Industry; United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "Note on Cyberattacks and Regulatory Regimes." Harvard Business School Background Note 723-392, October 2022.
- November 2024
- Supplement
FedEx Cyberattack (B): Reflections and Lessons
By: Hise Gibson, Frank Nagle, Alicia Dadlani and Martha Hostetter
Set in 2024, this (B) case provides an update to the (A) case (no. 625-049) about a devastating cyberattack that destroyed thousands of computers and business systems at FedEx’s European division in 2017. It describes lessons learned and changes made in the wake of the... View Details
Gibson, Hise, Frank Nagle, Alicia Dadlani, and Martha Hostetter. "FedEx Cyberattack (B): Reflections and Lessons ." Harvard Business School Supplement 625-059, November 2024.
- November 2024
- Case
FedEx Cyberattack (A): Navigating the NotPetya Storm
By: Hise Gibson, Frank Nagle, Alicia Dadlani and Martha Hostetter
In 2017, FedEx’s European division — acquired the year before for $5 billion — was hit by a devastating cyberattack that destroyed thousands of computers and business systems across several countries. Corporate Chief Information Officer Rob Carter put the company’s... View Details
Gibson, Hise, Frank Nagle, Alicia Dadlani, and Martha Hostetter. "FedEx Cyberattack (A): Navigating the NotPetya Storm." Harvard Business School Case 625-049, November 2024.
- 16 Jan 2024
- Cold Call Podcast
How SolarWinds Responded to the 2020 SUNBURST Cyberattack
- 07 Mar 2013
- News
Private firms playing major role against cyberattacks
- 16 Jan 2024
- News
How SolarWinds Responded to the 2020 SUNBURST Cyberattack
- October 2022 (Revised September 2023)
- Case
SolarWinds Confronts SUNBURST (A)
On December 12, 2020, SolarWinds learned that malware had been inserted in its software, potentially granting hackers access to thousands and thousands of its 300,000 customers. General Counsel Jason Bliss needed to orchestrate the company response without knowing how... View Details
Keywords: Cyberattacks; Cybersecurity; Corporate Disclosure; Crisis Management; Customer Focus and Relationships; Legal Liability; Information Technology Industry; United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "SolarWinds Confronts SUNBURST (A)." Harvard Business School Case 723-357, October 2022. (Revised September 2023.)
- October 2022 (Revised September 2023)
- Supplement
SolarWinds Confronts SUNBURST (B)
Supplements the (A) case, describing actions taken by SolarWinds as well as by regulatory agencies in the aftermath of the immediate crisis. The case also includes reflections by SolarWinds managers on the choices they made with respect to disclosure, media relations,... View Details
Keywords: Cyberattacks; Cybersecurity; Corporate Disclosure; Crisis Management; Customer Focus and Relationships; Legal Liability; Governance Compliance; Business and Government Relations; Information Technology Industry; United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "SolarWinds Confronts SUNBURST (B)." Harvard Business School Supplement 723-368, October 2022. (Revised September 2023.)
- 13 Aug 2024
- Research & Ideas
Why Companies Shouldn't Delay Software Updates—Even After CrowdStrike's Flaw
The CrowdStrike tech security outage in July revealed the true interdependence—and fragility—of global computer systems. Following several high-profile data breaches, policymakers are calling on businesses to do more to fix code weaknesses and protect systems from... View Details
- Forthcoming
- Article
Imagining the Future: Memory, Simulation and Beliefs
By: Pedro Bordalo, Giovanni Burro, Katherine B. Coffman, Nicola Gennaioli and Andrei Shleifer
How do people form beliefs about novel risks, with which they have little or no experience? Motivated by survey data on beliefs about Covid we collected in 2020, we build a model based on the psychology of selective memory. When a person thinks about an event,... View Details
Bordalo, Pedro, Giovanni Burro, Katherine B. Coffman, Nicola Gennaioli, and Andrei Shleifer. "Imagining the Future: Memory, Simulation and Beliefs." Review of Economic Studies (forthcoming). (Pre-published online June 27, 2024.)
- 09 Mar 2023
- Blog Post
Where Will You Be in 30 Years: Behind the Scenes of the 5 Big Life Decisions Documentary
personal losses, divorces, health challenges, lost jobs, failures, and criticisms endured over the years. Baroness Dido Harding (MBA 1992) offers a notable example. Throughout her career she faced intense criticism because of a View Details
- 01 Jun 2022
- News
Vision: Into the Breach
Cyberattacks are surging: Accenture reports that cyber intrusions jumped by 125 percent, globally, in the first half of 2021 over the same period in 2020. And while all those data breaches and ransomware attacks have meant major headaches... View Details
Keywords: Alexander Gelfand
- Web
Scams | Information Technology
Scams There are various scams and tactics that cybercriminals use to target us everyday. Learn more about common tactics they may use and steps you can take to minimize your risk. Be alert for suspicious messages Cyberattacks often begin... View Details
- 03 Mar 2016
- News
3-Minute Briefing: Pamela Meyer (MBA 1986)
protesting them, providing inappropriate detail, detour statements, false smiles. The issue that I’m most concerned about right now is inside threat mitigation. Studies show that anywhere from 30 percent to 50 percent of cyberattacks were... View Details
Keywords: Julia Hanna
- Web
Security & Privacy | Information Technology
benefit of the University and for the benefit of you and your loved ones. Apply Updates to Your Devices and Apps Cyberattacks exploit vulnerabilities in devices or apps to install malicious code and enable unauthorized access to systems... View Details
- 28 May 2019
- News
Ask the Expert: In Security
says. Companies are inherently vulnerable to cyberattacks because the very processes that enable growth also expose vulnerabilities. Mergers and acquisitions, for example, create confusion between converging IT infrastructures and... View Details
- 01 Jun 2016
- News
How Do We Win the Cyberwar?
private and public sectors can tilt the odds back to our favor—and what victory would really look like. Unite the Fight On February 13, 2015, President Obama announced an executive order that encouraged the exchange of cyberattack data... View Details
Keywords: Dan Morrell; illustrations by Victo Ngai