Filter Results:
(38)
Show Results For
- All HBS Web (38)
- Faculty Publications (9)
Show Results For
- All HBS Web (38)
- Faculty Publications (9)
Page 1 of 38
Results →
- 24 Sep 2018
- Blog Post
Working to Keep Pirates At-Bay: My Summer in Cyber Security
fascinated by Cyber Security and, therefore, as the summer approached, I started to look at opportunities in this area. Thanks to the HBS network and the Rock Fellowship support, I was able to find a summer... View Details
Keywords: Entrepreneurship
- July 2016 (Revised January 2019)
- Case
Cyber Breach at Target
By: Suraj Srinivasan, Lynn S. Paine and Neeraj Goyal
In November and December of 2013, Target Corporation suffered one of the largest cyber breaches to date. The breach that occurred during the busy holiday shopping season resulted in personal and credit card information of approximately 110 million Target customers... View Details
Keywords: Safety; Credit Cards; Customer Relationship Management; Internet and the Web; Governing and Advisory Boards; Crisis Management; Retail Industry
Srinivasan, Suraj, Lynn S. Paine, and Neeraj Goyal. "Cyber Breach at Target." Harvard Business School Case 117-027, July 2016. (Revised January 2019.)
- 2014
- Chapter
Better Timing of Cyber Conflict
By: Elisabeth Paulson and Christopher Griffin
In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict.... View Details
Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
- 04 Oct 2023
- News
A Tool to Help Boards Measure Cyber Resilience
- 24 Mar 2015
- News
See Your Company Through the Eyes of a Hacker
- 13 Apr 2023
- News
Cyber Risk Is Growing. Here’s How Companies Can Keep Up
- Web
Security & Privacy | Information Technology
Security & Privacy We all have a role to play in protecting Harvard Business School’s (HBS’s) data and systems—and our own. Practicing good security habits is always important, especially so in times of... View Details
- Web
Online Security for You and your Family | Information Technology
Online Security for You and your Family Adopting good cybersecurity habits is crucial for protecting your personal information and digital life. In today's interconnected world, cyber threats like identity... View Details
- February 2023
- Case
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama, fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to securely restore the network, medical... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Health Industry; United States; Alabama
Srinivasan, Suraj, and Li-Kuan (Jason) Ni. "Ransomware Attack at Springhill Medical Center." Harvard Business School Case 123-065, February 2023.
- Teaching Interest
Overview
By: Frank Nagle
Prof. Nagle has taught a wide variety of topics to various types of students including everything from computer programming and e-commerce for undergraduates to cyber security for the FBI and HBS Executive Education participants to innovation and technology management... View Details
- March 2023 (Revised June 2023)
- Teaching Note
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
Teaching Note for HBS Case No. 123-065. In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Business or Company Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Health Industry; Alabama; United States
- 21 Dec 2016
- Cold Call Podcast
Target's Expensive Cybersecurity Mistake
- September 2017 (Revised July 2018)
- Case
CyberArk: Protecting the Keys to the IT Kingdom
By: Raffaella Sadun, David Yoffie and Margot Eiran
CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)
- April 2021
- Case
Transforming BlackBerry: From Smartphones to Software
By: Ranjay Gulati and Nicole Tempest Keller
On the verge of failure, BlackBerry brought in John Chen as CEO in 2013 to orchestrate a bold turnaround of the company. Once an iconic leader in the smartphone market, BlackBerry was best known for its tactile QWERTY keyboard, strong security, and a focus on business... View Details
Keywords: Pivot; Managing Change; Turnaround; Smartphone; Change Management; Leading Change; Transformation; Organizational Change and Adaptation; Digital Platforms; Change; Information Infrastructure; Applications and Software; Competitive Strategy; Cybersecurity; Technology Industry; Transportation Industry; Canada
Gulati, Ranjay, and Nicole Tempest Keller. "Transforming BlackBerry: From Smartphones to Software." Harvard Business School Case 421-052, April 2021.
Frank Nagle
Frank Nagle is an assistant professor in the Strategy Unit at Harvard Business School. Professor Nagle studies how competitors can collaborate on the creation of core technologies, while still competing on the products and services built on top of them - especially... View Details
- Web
2023 Reunion Presentations - Alumni
they delve into emerging trends and technologies in cyber risk management, such as artificial intelligence, cloud computing, and cyber insurance. We will discuss useful frameworks for integrating View Details
- Web
Faculty & Advisors - MBA
security system. Chad designed the original product himself and grew the company under the radar of long-established competitors. The company grew with only a single angel investment in 2006 until receiving $57M in 2014 from Sequoia in a... View Details
- Web
Past Issues - Alumni
an HBS Colloquium Complete Table of Contents June 2003 Portraits from the Class of 2003 Heidi Brooks Up Against The Firewall Managers and Cyber Security Complete Table of Contents March 2003 All in a Day's... View Details
- 01 Jun 2003
- News
Up Against The Firewall
Is your company doing enough to protect itself from cyber attacks? According to several HBS faculty and alumni experts, senior executives need to pay more attention to this potential threat. It makes good business sense — and fulfills a... View Details
- 13 Feb 2019
- News
We’re All Going to Get Hacked
evolving cyber threats. Rothrock lays out his solutions in his latest book, Digital Resilience: Is Your Company Ready for the Next Cyber Threat?, and we talk to him here about what that looks like in real... View Details