Filter Results:
(65)
Show Results For
- All HBS Web
(122)
- News (30)
- Research (65)
- Multimedia (2)
- Faculty Publications (59)
Show Results For
- All HBS Web
(122)
- News (30)
- Research (65)
- Multimedia (2)
- Faculty Publications (59)
Page 1 of 65
Results →
Sort by
- 21 Dec 2016
- Cold Call Podcast
Target's Expensive Cybersecurity Mistake
- Article
Cybersecurity Features of Digital Medical Devices: An Analysis of FDA Product Summaries
By: Ariel Dora Stern, William J. Gordon, Adam B. Landman and Daniel B. Kramer
Objectives:
To more clearly define the landscape of digital medical devices subject to U.S. Food and Drug Administration (FDA) oversight, this analysis leverages publicly available regulatory documents to characterise the prevalence and trends of software and... View Details
To more clearly define the landscape of digital medical devices subject to U.S. Food and Drug Administration (FDA) oversight, this analysis leverages publicly available regulatory documents to characterise the prevalence and trends of software and... View Details
Keywords: Digital; Medicine; FDA; Health Care and Treatment; Applications and Software; Safety; Cybersecurity; Medical Devices and Supplies Industry
Stern, Ariel Dora, William J. Gordon, Adam B. Landman, and Daniel B. Kramer. "Cybersecurity Features of Digital Medical Devices: An Analysis of FDA Product Summaries." BMJ Open 9, no. 6 (June 2019).
- October 2023 (Revised March 2024)
- Case
Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game
By: Tsedal Neeley, Jeff Huizinga and Emily Grandjean
Ken Xie, cofounder of cybersecurity giant Fortinet, faced a critical decision that would validate his leadership. Fortinet became the industry’s second-largest pureplay cybersecurity firm by developing differentiated hardware and investing in R&D. However, after a... View Details
Keywords: Leadership Development; Leadership Style; Marketing Strategy; Communication Strategy; Cybersecurity; Competitive Advantage; Information Technology Industry; United States; Sunnyvale
Neeley, Tsedal, Jeff Huizinga, and Emily Grandjean. "Fortinet: Cybersecurity Pioneer Ken Xie Considers the Long Game." Harvard Business School Case 424-016, October 2023. (Revised March 2024.)
- March 2024 (Revised August 2024)
- Supplement
Darktrace: Scaling Cybersecurity and AI (B)
By: Jeffrey F. Rayport and Alexis Lefort
Rayport, Jeffrey F., and Alexis Lefort. "Darktrace: Scaling Cybersecurity and AI (B)." Harvard Business School Supplement 824-179, March 2024. (Revised August 2024.)
- March 2024 (Revised August 2024)
- Case
Darktrace: Scaling Cybersecurity and AI (A)
By: Jeffrey F. Rayport and Alexis Lefort
In 2023, Darktrace CEO Poppy Gustafsson was contemplating her growth strategy at a leading U.K.-based cybersecurity venture, launched in 2013 by a group of anti-terror cyber specialists, University of Cambridge mathematicians, and artificial intelligence (AI) experts.... View Details
Keywords: Technology; Talent; Scaling; Entrepreneurship; Cybersecurity; Leadership; Business Growth and Maturation; Recruitment; Resignation and Termination; AI and Machine Learning; Growth and Development Strategy; Organizational Culture; Going Public; Technology Industry; United Kingdom; Europe; United States
Rayport, Jeffrey F., and Alexis Lefort. "Darktrace: Scaling Cybersecurity and AI (A)." Harvard Business School Case 824-092, March 2024. (Revised August 2024.)
- Article
Why Boards Aren't Dealing with Cyberthreats
By: J. Yo-Jud Cheng and Boris Groysberg
Cheng, J. Yo-Jud, and Boris Groysberg. "Why Boards Aren't Dealing with Cyberthreats." Harvard Business Review (website) (February 22, 2017). (Excerpt featured in the Harvard Business Review. May–June 2017 "Idea Watch" section.)
- September 2023 (Revised June 2024)
- Case
CyberArk: Fearlessly Forward in a Digital World
By: David B. Yoffie and Daniela Beyersdorfer
CyberArk was a leader in privileged access management and was an emerging leader in security identity. This case explores strategies in cybersecurity and whether big bets are needed to become a global leader. View Details
Yoffie, David B., and Daniela Beyersdorfer. "CyberArk: Fearlessly Forward in a Digital World." Harvard Business School Case 724-382, September 2023. (Revised June 2024.)
- March 2024
- Teaching Note
CyberArk: Fearlessly Forward in a Digital World
By: David B. Yoffie
Teaching Note for HBS Case No. 724-382. CyberArk was a leader in privileged access management and was an emerging leader in security identity. This case explores strategies in cybersecurity and whether big bets are needed to become a global leader. View Details
- October 2022 (Revised September 2023)
- Supplement
SolarWinds Confronts SUNBURST (B)
Supplements the (A) case, describing actions taken by SolarWinds as well as by regulatory agencies in the aftermath of the immediate crisis. The case also includes reflections by SolarWinds managers on the choices they made with respect to disclosure, media relations,... View Details
Keywords: Cyberattacks; Cybersecurity; Corporate Disclosure; Crisis Management; Customer Focus and Relationships; Legal Liability; Governance Compliance; Business and Government Relations; Information Technology Industry; United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "SolarWinds Confronts SUNBURST (B)." Harvard Business School Supplement 723-368, October 2022. (Revised September 2023.)
- September 2016
- Case
Hewlett Packard Enterprise: The Dandelion Program
By: Gary P. Pisano and Robert D. Austin
This case describes Hewlett Packard Enterprise’s “Dandelion Program," which has developed a new service offering for the company’s clients by drawing on the special talents of people with autism. The company has deployed “pods” organized around 8 or 9 employees with... View Details
Keywords: Organizational Behavior; Information Technology; Organizational Change and Adaptation; Leadership; Talent and Talent Management; Service Operations; Training; Diversity; Innovation and Invention; Technology Industry
Pisano, Gary P., and Robert D. Austin. "Hewlett Packard Enterprise: The Dandelion Program." Harvard Business School Case 617-016, September 2016.
- October 2017 (Revised April 2019)
- Case
Data Breach at Equifax
By: Suraj Srinivasan, Quinn Pitcher and Jonah S. Goldberg
The case discusses the events leading up to the massive data breach at Equifax, one of the three U.S. credit reporting companies, the organizational and governance issues that contributed to the breach, and the consequences of the breach. The case supplement provides... View Details
Srinivasan, Suraj, Quinn Pitcher, and Jonah S. Goldberg. "Data Breach at Equifax." Harvard Business School Case 118-031, October 2017. (Revised April 2019.)
- Teaching Interest
Overview
By: Frank Nagle
Prof. Nagle has taught a wide variety of topics to various types of students including everything from computer programming and e-commerce for undergraduates to cyber security for the FBI and HBS Executive Education participants to innovation and technology management... View Details
- January 2025
- Case
Cyber Oversight: SolarWinds Board of Directors
By: Lynn S. Paine
In 2020, just two years after its IPO, information technology company SolarWinds discovered that it was the victim of an attack on its information systems by Russian hackers. The incident, known as the Sunburst attack, was costly for the company, and certain... View Details
Keywords: Corporate Governance; Corporate Accountability; Governing and Advisory Boards; Cybersecurity; Lawsuits and Litigation; Legal Liability; Business and Shareholder Relations; Information Technology Industry; United States; Texas; Delaware
Paine, Lynn S. "Cyber Oversight: SolarWinds Board of Directors." Harvard Business School Case 325-080, January 2025.
- 2022
- White Paper
Census II of Free and Open Source Software - Application Libraries
By: Frank Nagle, James Dana, Jennifer Hoffman, Steven Randazzo and Yanuo Zhou
Produced in partnership with Harvard Laboratory for Innovation Science (LISH) and the Open Source Security Foundation (OpenSSF), Census II is the second investigation into the widespread use of Free and Open Source Software (FOSS). The Census II effort utilizes data... View Details
Nagle, Frank, James Dana, Jennifer Hoffman, Steven Randazzo, and Yanuo Zhou. "Census II of Free and Open Source Software - Application Libraries." White Paper, Linux Foundation and Laboratory for Innovation Science at Harvard, March 2022.
- August 2022
- Supplement
Atlanta Ransomware Attack (B)
By: Amit Goldenberg and Julian Zlatev
This case describes the March 2018 Ransomware attack on the information technology (IT) systems of the city of Atlanta and the response by Mayor Keisha Lance Bottoms and her administration. The case includes a brief background on Bottoms and her young administration at... View Details
Keywords: Crime and Corruption; Decision Making; Cost vs Benefits; Decision Choices and Conditions; Decisions; Ethics; Values and Beliefs; Government and Politics; Government Administration; Information Technology; Cybersecurity; Information Management; Leadership; Management; Crisis Management; Management Teams; Negotiation; Risk and Uncertainty; Social Psychology; Perception; Personal Characteristics; Perspective; Power and Influence; Society; Public Administration Industry; United States; Atlanta; Georgia (state, US)
Goldenberg, Amit, and Julian Zlatev. "Atlanta Ransomware Attack (B)." Harvard Business School Supplement 923-010, August 2022.
- March 2023
- Case
Ransomware Attack at Colonial Pipeline Company
By: Suraj Srinivasan and Li-Kuan Ni
On the morning of May 7, 2021, Colonial Pipeline Company became aware that the company had been the victim of a malicious ransomware attack that had stolen and locked up company data. The extortionists demanded 75 bitcoins (worth about $4.4 million at the time) in... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Business or Company Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Infrastructure; Distribution Industry; United States; Alabama
Srinivasan, Suraj, and Li-Kuan Ni. "Ransomware Attack at Colonial Pipeline Company." Harvard Business School Case 123-069, March 2023.
- August 2022
- Case
Atlanta Ransomware Attack (A)
By: Amit Goldenberg and Julian Zlatev
This case describes the March 2018 Ransomware attack on the information technology (IT) systems of the city of Atlanta and the response by Mayor Keisha Lance Bottoms and her administration. The case includes a brief background on Bottoms and her young administration at... View Details
Keywords: Crime and Corruption; Decision Making; Cost vs Benefits; Decision Choices and Conditions; Decisions; Ethics; Values and Beliefs; Government and Politics; Government Administration; Information Technology; Cybersecurity; Information Management; Leadership; Management; Crisis Management; Management Teams; Negotiation; Risk and Uncertainty; Social Psychology; Perception; Personal Characteristics; Perspective; Power and Influence; Society; Public Administration Industry; United States; Georgia (state, US); Atlanta
Goldenberg, Amit, and Julian Zlatev. "Atlanta Ransomware Attack (A)." Harvard Business School Case 923-009, August 2022.
- March 2023
- Teaching Note
Ransomware Attack at Colonial Pipeline Company
By: Suraj Srinivasan and Li-Kuan Ni
Teaching Note for HBS Case No. 123-069. On the morning of May 7, 2021, Colonial Pipeline Company became aware that the company had been the victim of a malicious ransomware attack that had stolen and locked up company data. The extortionists demanded 75 bitcoins (worth... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Business or Company Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Infrastructure; Distribution Industry; United States; Alabama
- April 2020
- Supplement
Cisco Systems and OpenDNS: Strategic Integration (B)
By: Andy Wu and David Wang
With more than 72,000 employees and revenues approaching the $50B mark, Cisco Systems is one of the largest information technology and networking firms globally. As the company grew and expanded into different lines of businesses, Cisco consistently looked outwards for... View Details
Keywords: Mergers and Acquisitions; Integration; Corporate Strategy; Change Management; Entrepreneurship; Organizational Culture; Information Technology Industry
Wu, Andy, and David Wang. "Cisco Systems and OpenDNS: Strategic Integration (B)." Harvard Business School Supplement 720-466, April 2020.
- September 2017 (Revised July 2018)
- Case
CyberArk: Protecting the Keys to the IT Kingdom
By: Raffaella Sadun, David Yoffie and Margot Eiran
CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)