Navigation Menu
Harvard Business Review Home
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Close menu
CLEAR
  • SUGGESTED TOPICS
Explore HBR
  • Latest
  • The Magazine
  • Podcasts
  • Store
  • Webinars
  • Newsletters
Popular Topics
  • Managing Yourself
  • Leadership
  • Strategy
  • Managing Teams
  • Gender
  • Innovation
  • Work-life Balance
  • All Topics
For Subscribers
  • The Big Idea
  • Data & Visuals
  • Reading Lists
  • Case Selections
  • HBR Learning
  • Subscribe
My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Log Out
  • Sign In
Subscribe Latest Podcasts The Magazine Store Webinars Newsletters All Topics The Big Idea Data & Visuals Reading Lists Case Selections HBR Learning My Library Account Settings Log Out Sign In

Your Cart

Your Shopping Cart is empty.
Visit Our Store
Guest User
Subscriber
My Library Topic Feeds Orders Account Settings Email Preferences Log Out
Reading List
Reading Lists

IT security management

Follow this topic
Following
Related Topics:
  • Business management
  • IT management
See All Topics
Popular
Popular From the Store For You
  • Is Third-Party Software Leaving You Vulnerable to Cyberattacks?

    Cybersecurity and digital privacy Digital Article
    • Keman Huang
    • Keri Pearlson
    • Stuart Madnick
    The SolarWinds hack highlights the importance of vetting your vendors.
    • Save
    • Share
    • May 13, 2021
  • Boards Are Having the Wrong Conversations About Cybersecurity

    Technology & Operations Digital Article
    • Lucia Milică
    • Keri Pearlson
    A survey of 600 directors suggests that growing awareness of cyber risk isn't enough to drive better preparedness.
    • Save
    • Share
    • Buy Copies
    • May 02, 2023
  • Cyberattacks Are Inevitable. Is Your Company Prepared?

    Cybersecurity and digital privacy Digital Article
    • Keri Pearlson
    • Brett Thorson
    • Stuart Madnick
    • Michael Coden
    The first time you test your plan shouldn’t be during a crisis.
    • Save
    • Share
    • March 09, 2021
  • What It Takes to Sell Cloud-Based Software to the U.S. Government

    Technology & Operations Digital Article
    • Luke Bencie
    • Sarah Bencie
    Complying with FedRAMP is worth the investment.
    • Save
    • Share
    • Buy Copies
    • May 11, 2023
  • 7 Pressing Cybersecurity Questions Boards Need to Ask

    IT security management Digital Article
    • Dr. Keri Pearlson
    • Nelson Novaes Neto
    Don’t leave concerns about critical vulnerabilities for tomorrow.
    • Save
    • Share
    • March 04, 2022
  • How to Safeguard Against Cyberattacks on Utilities

    Decision making and problem solving Digital Article
    • Stuart Madnick
    In 2019, California showed us how costly a sustained power outage can be.
    • Save
    • Share
    • January 23, 2020
  • How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now

    Cybersecurity and digital privacy Digital Article
    • Brenda R. Sharton
    Scams and attacks have become more frequent and sophisticated as the crisis unfolds.
    • Save
    • Share
    • May 01, 2020
  • What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare

    Cybersecurity and digital privacy Digital Article
    • Stuart Madnick
    And how organizations around the world can prepare
    • Save
    • Share
    • March 07, 2022
  • Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready?

    Technology & Operations Digital Article
    • Ben Buchanan
    Platforms have a propaganda problem.
    • Save
    • Share
    • Buy Copies
    • August 24, 2018
  • The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict

    Technology & Operations Digital Article
    • Paul R Kolbe
    • Maria Robson Morrow
    • Lauren Zabierek
    Now is the time to revisit your business continuity plans.
    • Save
    • Share
    • Buy Copies
    • February 18, 2022
  • New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?

    Cybersecurity and digital privacy Digital Article
    • Andrew Burt
    The consequences of weak security are about to go way beyond bad PR.
    • Save
    • Share
    • July 31, 2019
  • Cybersecurity Insurance Has a Big Problem

    Risk management Digital Article
    • Tom Johansmeyer
    There’s literally not enough money to keep the system afloat in the event of a major attack.
    • Save
    • Share
    • January 11, 2021
  • Don't Acquire a Company Until You Evaluate Its Data Security

    Technology & Operations Digital Article
    • Chirantan Chatterjee
    • D Daniel Sokol
    Beware the "data lemon."
    • Save
    • Share
    • Buy Copies
    • April 16, 2019
  • Raytheon CEO Gregory Hayes: How Ukraine Has Highlighted Gaps in US Defense Technologies

    Global Business Digital Article
    • Gregory Hayes
    • Adi Ignatius
    How does a company that gets two million hack attempts each week think about security?
    • Save
    • Share
    • Buy Copies
    • March 25, 2022
  • How to Red Team a Gen AI Model

    Technology & Operations Digital Article
    • Andrew Burt
    The harms that generative AI systems create often differ from other forms of AI in both scope and scale.
    • Save
    • Share
    • Buy Copies
    • January 04, 2024
  • Does Your Cyber Insurance Cover a State-Sponsored Attack?

    Crisis management Digital Article
    • Jon Bateman
    Decisions you make today will determine whether you’re facing financial chaos — or just a bad day at the office.
    • Save
    • Share
    • October 30, 2020
  • Cybersecurity Is Not (Just) a Tech Problem

    Cybersecurity and digital privacy Digital Article
    • Lakshmi Hanspal
    Four steps to building a company culture that reinforces your IT initiatives.
    • Save
    • Share
    • January 06, 2021
  • Why Companies Are Forming Cybersecurity Alliances

    Cybersecurity and digital privacy Digital Article
    • Daniel Dobrygowski
    They’re stepping up where governments haven’t.
    • Save
    • Share
    • September 11, 2019
  • Is Your Board Prepared for New Cybersecurity Regulations?

    Technology & Operations Digital Article
    • Keri Pearlson
    • Chris Hetner
    A proposed SEC rule would require companies to disclose their cybersecurity governance capabilities.
    • Save
    • Share
    • Buy Copies
    • November 11, 2022
  • Quantum Computing for Business Leaders

    Technology & Operations Magazine Article
    • Jonathan Ruane
    • Andrew McAfee
    • William D. Oliver
    Quantum computers can solve problems exponentially faster than classical computers can. They will bring about two huge changes: an end to our current...
    • Save
    • Share
    • Buy Copies
    • From the January–February 2022 Issue
  • iPremier (B): Denial of Service Attack (Graphic Novel Version)

    Technology & Operations Case Study
    • Robert D. Austin
    • Jeremy C. Short
    5.00
    View Details
    Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure...
    • Save
    • Share
    • June 29, 2009
  • iPremier (A): Denial of Service Attack (Graphic Novel Version)

    Technology & Operations Case Study
    • Robert D. Austin
    • Jeremy C. Short
    11.95
    View Details
    Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure...
    • Save
    • Share
    • June 25, 2009
  • iPremier (C): Denial of Service Attack (Graphic Novel Version)

    Technology & Operations Case Study
    • Robert D. Austin
    • Jeremy C. Short
    5.00
    View Details
    Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure...
    • Save
    • Share
    • June 29, 2009
  • HBR Insights Future of Business Boxed Set (8 Books)

    Leadership & Managing People Book
    • Harvard Business Review
    165.00
    View Details
    Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future...
    • Save
    • Share
    • January 12, 2021
  • The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy

    Technology & Operations Case Study
    • Venkatesh Narayanamurti
    • Ryan Ellis
    11.95
    View Details
    In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control...
    • Save
    • Share
    • February 04, 2015
  • The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia

    Innovation & Entrepreneurship Case Study
    • Ryan Nelson
    • Ryan Wright
    11.95
    View Details
    This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through...
    • Save
    • Share
    • September 27, 2017
  • Mossack Fonseca: Panama Papers

    Technology & Operations Case Study
    • German Retana
    • Carlos Fernandez
    11.95
    View Details
    Mossack Fonseca, a Panama-based law firm, specializes in Corporate Law, fiduciary services, investment advice, and international business. In April 2016,...
    • Save
    • Share
    • August 08, 2021
  • PopVote: Assessing the Risk of DDoS (A)

    Technology & Operations Case Study
    • Kai Lung Hui
    • Minyi Huang
    • Ping Fan Ke
    • Anthony Lai
    11.95
    View Details
    In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world...
    • Save
    • Share
    • August 16, 2016
  • Avalon Information Services, Inc.

    Sales & Marketing Case Study
    • Lynn Sharp Paine
    • Wilda L. White
    11.95
    View Details
    The Privacy Review Committee of Avalon Information Services must decide how to deal with concerns voiced by its retail supermarket customers about the...
    • Save
    • Share
    • January 10, 1995
  • Security Breach at TJX

    Technology & Operations Case Study
    • Nicole R.D. Haggerty
    • Chandra Sekhar Ramasastry
    11.95
    View Details
    The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer...
    • Save
    • Share
    • March 12, 2008
  • Everybody Knows: Russia and the Election

    Global Business Case Study
    • Rawi Abdelal
    • Rafael Di Tella
    • Galit Goldstein
    11.95
    View Details
    Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the...
    • Save
    • Share
    • October 03, 2018
  • Hydropack India Pvt. Ltd.: Resolving a Data Breach

    Technology & Operations Case Study
    • Gurudutt Nayak
    11.95
    View Details
    In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology...
    • Save
    • Share
    • July 20, 2021
  • iPremier (B): Denial of Service Attack (Graphic Novel Version)

    Technology & Operations Case Study
    • Robert D. Austin
    • Jeremy C. Short
    5.00
    View Details
    Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure...
    • Save
    • Share
    • June 29, 2009
  • Is Third-Party Software Leaving You Vulnerable to Cyberattacks?

    Cybersecurity and digital privacy Digital Article
    • Keman Huang
    • Keri Pearlson
    • Stuart Madnick
    The SolarWinds hack highlights the importance of vetting your vendors.
    • Save
    • Share
    • May 13, 2021
  • Boards Are Having the Wrong Conversations About Cybersecurity

    Technology & Operations Digital Article
    • Lucia Milică
    • Keri Pearlson
    A survey of 600 directors suggests that growing awareness of cyber risk isn't enough to drive better preparedness.
    • Save
    • Share
    • Buy Copies
    • May 02, 2023
  • Cyberattacks Are Inevitable. Is Your Company Prepared?

    Cybersecurity and digital privacy Digital Article
    • Keri Pearlson
    • Brett Thorson
    • Stuart Madnick
    • Michael Coden
    The first time you test your plan shouldn’t be during a crisis.
    • Save
    • Share
    • March 09, 2021
  • What It Takes to Sell Cloud-Based Software to the U.S. Government

    Technology & Operations Digital Article
    • Luke Bencie
    • Sarah Bencie
    Complying with FedRAMP is worth the investment.
    • Save
    • Share
    • Buy Copies
    • May 11, 2023
  • 7 Pressing Cybersecurity Questions Boards Need to Ask

    IT security management Webinar
    • Dr. Keri Pearlson
    Featuring Dr. Keri Pearlson, Executive Director of the Cybersecurity at MIT Sloan (CAMS) Research Consortium. Complimentary HBR Webinar Thursday, May 25, 12:00 pm EDT In the face of increasing cybersecurity threats — that pose significant risks for firms — boards of directors have a unique role to play in helping their organizations manage these threats. Boards […]
    • Save
    • Share
    • May 25, 2023
  • 7 Pressing Cybersecurity Questions Boards Need to Ask

    IT security management Digital Article
    • Dr. Keri Pearlson
    • Nelson Novaes Neto
    Don’t leave concerns about critical vulnerabilities for tomorrow.
    • Save
    • Share
    • March 04, 2022
  • How to Safeguard Against Cyberattacks on Utilities

    Decision making and problem solving Digital Article
    • Stuart Madnick
    In 2019, California showed us how costly a sustained power outage can be.
    • Save
    • Share
    • January 23, 2020
  • How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now

    Cybersecurity and digital privacy Digital Article
    • Brenda R. Sharton
    Scams and attacks have become more frequent and sophisticated as the crisis unfolds.
    • Save
    • Share
    • May 01, 2020
  • iPremier (A): Denial of Service Attack (Graphic Novel Version)

    Technology & Operations Case Study
    • Robert D. Austin
    • Jeremy C. Short
    11.95
    View Details
    Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure...
    • Save
    • Share
    • June 25, 2009

Popular Topics

Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
See all topics

Partner Center

Latest Magazine Topics Podcasts Store The Big Idea Data & Visuals Case Selections HBR Learning Ask AI
Harvard Business Review Home
Subscribe
Explore HBR
  • The Latest
  • All Topics
  • Magazine Archive
  • The Big Idea
  • Reading Lists
  • Case Selections
  • Podcasts
  • Webinars
  • Data & Visuals
  • My Library
  • Newsletters
  • HBR Press
HBR Store
  • Article Reprints
  • Books
  • Cases
  • Collections
  • Magazine Issues
  • HBR Guide Series
  • HBR 20-Minute Managers
  • HBR Emotional Intelligence Series
  • HBR Must Reads
  • Tools
About HBR
  • Contact Us
  • Advertise with Us
  • Information for Booksellers/Retailers
  • Masthead
  • Global Editions
  • Media Inquiries
  • Guidelines for Authors
  • HBR Analytic Services
  • Copyright Permissions
Manage My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Account FAQ
  • Help Center
  • Contact Customer Service
Follow HBR
  • Facebook
  • X Corp.
  • LinkedIn
  • Instagram
  • Your Newsreader
Harvard Business Publishing
  • About Us
  • Careers
  • Privacy Policy
  • Cookie Policy
  • Copyright Information
  • Trademark Policy
  • Terms of Use

Harvard Business Publishing:
  • Higher Education
  • Corporate Learning
  • Harvard Business Review
  • Harvard Business School
Copyright ©   Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.