Visit hbs.edu

Cybersecurity

Thanks to a growing reliance on complex digital systems (WiFi, Bluetooth, networked devices) and increasing sophistication and frequency in attacks, cybersecurity is more pressing than ever. Orgs can’t afford to neglect having a strategy in place for this one.
James Mickens thumbnail image with title

James Mickens on why all data science is political

In this episode, we are speaking with James Mickens from the Harvard John A. Paulson School of Engineering and Applied Sciences (SEAS) about the ethical challenges in cybersecurity, the societal implications of data science, and the importance of humor in learning.

Your Biggest Asset is Now Your Biggest Risk

The majority of spending on cybersecurity efforts goes towards protecting organizations from external hackers. The truth is, though, that the majority of security breaches actually come from within an organization. Learn how to protect your organization with this primer on developing insider threat programs from ObserveIT.

Peter Cowhey and Jonathan Aronson on global governance

On November 29th, 2017 the Digital Seminar series hosted Peter Cowhey from the School of Global Policy & Strategy at the University of California, San Diego and Jonathan Aronson from the Annenberg School of Communication & Journalism at the University of Southern California.

secret-theres-no-secret

The Secret is “There are No Secrets”

Thinking that fancy math and big numbers will increase our safety online? SEAS Professor James Mickens urges you to think again. In this talk from our 2017 Future Assembly conference, Mickens helps us understand how precarious the current state of cybersecurity is.

landscape-bullseye

Case Study: Cyber Breach at Target

With the number of major cyber breaches in recent years (Equifax, Sony, DNC anyone?), the Target breach of 2013 may seem like ancient history. But this case from Suraj Srinivasan, which focuses on how Target managed/could have managed the attack, offers many much-needed, highly-relevant leadership lessons for today.

intertnational-flags

How Cyberspace is Transforming International Security

Related: cybersecurity issues are completely transforming the way that international security is handled. How will these changes impact international governance and norms and alter the way that the public and private sector alike handle cybersecurity? Faculty affiliate Derek Reveron has some ideas.

cybersecurity-defense

How to Build Your Cybersecurity Defense

In addition to having a responsibility to be thinking about cybersecurity as a strategic priority, executives should be collaborating with IT to address cybersecurity within their organization. When the C-Suite and IT are in alignment with regards to cybersecurity, organizations are much better equipped to effectively handle threats.

prolifiration-of-malware

Countering the Proliferation of Malware

Governments have turned to export controls to block the international transfer of malicious software and limit its harmful effects. However, these export controls are failing to check the spread of malware for a variety of reasons. This proposal from the Belfer Center for Science and International Affairs highlights 10 recommendations for things states could be doing to address the spread of malicious software instead.

night-sky

Cybersecurity Strategy for the C-Suite

If the Equifax attack is any example, executives have a lot of work to do to become real leaders in the field of cybersecurity. Organizations can’t afford to ignore cybersecurity or just hope that it “goes away” or keep their fingers crossed that attackers will hit the next guy over. Even if you’re already thinking about security within your own organization, this webinar is a great resource to help you prepare for an uncertain and insecure world.

    Engage With Us

    Join Our Community

    Ready to dive deeper with the Digital Data Design Institute at Harvard? Subscribe to our newsletter, contribute to the conversation and begin to invent the future for yourself, your business and society as a whole.