Skip to main content

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks

MacDonnell Ulsch

ISBN: 978-1-118-93595-8

Jul 2014

224 pages

$32.99

Description

Conquering cyber attacks requires a multi-sector, multi-modal approach

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information.

Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include:

  • The information at risk
  • The true extent of the threat
  • The potential consequences across sectors
  • The multifaceted approach to defense

The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.

Related Resources

Instructor

Request an Evaluation Copy for this title

Foreword xiii

Preface xv

Acknowledgments xvii

Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming 1

What Factors Create a Perfect Storm? 2

Increasingly Sophisticated Attacks 8

Mobile Devices at Higher Risk 9

Sometimes Security Just Doesn’t Take Hold 9

It Wasn’t Always Like This 10

Without a Bang 11

A Board Issue 12

The Cyber Frankenstein Cometh 13

Defining Success 14

Notes 15

PART I: THE CYBER THREAT TO THE CORPORATE BRAND: HOW IT WILL IMPACT YOUR COMPANY

Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact 19

Is Nothing Sacred? 23

The Liberty Reserve Case: Money Laundering in the Digital Age 24

The Corruption Factor 27

Information Threat, Physical Threat 32

Notes 33

Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy 35

A Case of Cyber Espionage Conspiracy? 43

According to the Select Committee . . . 54

Notes 55

Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure 57

A Disabled America 59

A New Age: Inspiring Terrorists and Terrorism 62

A Call Heard Vaguely 64

Attack upon Attack, No Peace in Sight 67

Notes 68

PART II: CORPORATE VULNERABILITIES IN THE DIGITAL SOCIETY: PREPARE TO DEFEND YOURSELF AND YOUR BRAND

Chapter 4: What Is the True Cost of a Cyber Attack? 71

Cyber Attack Detection Sometimes Takes Years 74

One of the First Questions: “How Much Will This Cost?” 76

A Few Common Cost Factors 77

What about Unreported Breaches? 78

Cyber Attacks Result in a Wider Impact: The Community 81

Notes 83

Chapter 5: U.S. Cyber Public Policy: Don’t Rely on It to Protect the Brand 85

No Guarantees with This Executive Order 88

Government-Industry Cooperation: No Silver Bullet 91

The Challenge of Defining Cyber Public Policy 92

Cold War II: The Cyber Chapter 93

Is There a Silver Lining in an Attack? 97

Notes 102

Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts 103

Technology Trend 104

Loss of Situational Awareness: Distraction 107

Culture 108

Technology Is a Double-Edged Sword 109

Notes 112

Chapter 7: Social Media and Digital Protest 113

Social Media: A Tool for Disruption, a Model for Change 116

The Hacker Group Anonymous 117

Anarchaos: In the Image of Anonymous 125

Notes 126

PART III: PROTECTING THE BRAND: ACTIONS EXECUTIVE MANAGEMENT MUST TAKE TO REDUCE CYBER RISK

Chapter 8: Managing the Brand When the Worst Occurs 129

Be Prepared 132

Chapter 9: Managing the Big Risk: Third-Party Vendors 145

Background Investigation Suggestions to Improve Process 149

Risk-Reinforced Service Level Agreements 154

Clouds Fill the Horizon 166

Notes 169

Chapter 10: Creating Executive Cyber Risk Councils 171

The Goal of the Executive Cyber Risk Council 175

Who Should Be Included in the Executive Risk Council? 176

Chapter 11: Early Warnings: Something Bad Is on the Way 185

Technical Signals Are There—But You’ve Got to Look 187

Know Who’s Inside the Enterprise 190

What a Web We Weave . . . When Surfing 192

About the Author 197

Index 199