Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations.
Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: * The information at risk * The true extent of the threat * The potential consequences across sectors * The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
MacDONNELL ULSCH is currently a managing director of cyber crime and breach response at a large international consulting firm. He is the author of the highly regarded book Threat! Managing Risk in a Hostile World. Mr. Ulsch has investigated many high-impact cyber breach and technology espionage cases and advises a diverse range of private-sector and government clients on the cyber threat, how to manage a cyber attack when it occurs, and how to reduce the risk impact of one. He has appeared on Fox News, ABC News, and other media outlets, and has been quoted in many publications, including academic and military studies.
Foreword xiii Preface xv Acknowledgments xvii Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming 1 What Factors Create a Perfect Storm? 2 Increasingly Sophisticated Attacks 8 Mobile Devices at Higher Risk 9 Sometimes Security Just Doesn t Take Hold 9 It Wasn t Always Like This 10 Without a Bang 11 A Board Issue 12 The Cyber Frankenstein Cometh 13 Defining Success 14 Notes 15 PART I: THE CYBER THREAT TO THE CORPORATE BRAND: HOW IT WILL IMPACT YOUR COMPANY Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact 19 Is Nothing Sacred? 23 The Liberty Reserve Case: Money Laundering in the Digital Age 24 The Corruption Factor 27 Information Threat, Physical Threat 32 Notes 33 Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy 35 A Case of Cyber Espionage Conspiracy? 43 According to the Select Committee ... 54 Notes 55 Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure 57 A Disabled America 59 A New Age: Inspiring Terrorists and Terrorism 62 A Call Heard Vaguely 64 Attack upon Attack, No Peace in Sight 67 Notes 68 PART II: CORPORATE VULNERABILITIES IN THE DIGITAL SOCIETY: PREPARE TO DEFEND YOURSELF AND YOUR BRAND Chapter 4: What Is the True Cost of a Cyber Attack? 71 Cyber Attack Detection Sometimes Takes Years 74 One of the First Questions: How Much Will This Cost? 76 A Few Common Cost Factors 77 What about Unreported Breaches? 78 Cyber Attacks Result in a Wider Impact: The Community 81 Notes 83 Chapter 5: U.S. Cyber Public Policy: Don t Rely on It to Protect the Brand 85 No Guarantees with This Executive Order 88 Government-Industry Cooperation: No Silver Bullet 91 The Challenge of Defining Cyber Public Policy 92 Cold War II: The Cyber Chapter 93 Is There a Silver Lining in an Attack? 97 Notes 102 Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts 103 Technology Trend 104 Loss of Situational Awareness: Distraction 107 Culture 108 Technology Is a Double-Edged Sword 109 Notes 112 Chapter 7: Social Media and Digital Protest 113 Social Media: A Tool for Disruption, a Model for Change 116 The Hacker Group Anonymous 117 Anarchaos: In the Image of Anonymous 125 Notes 126 PART III: PROTECTING THE BRAND: ACTIONS EXECUTIVE MANAGEMENT MUST TAKE TO REDUCE CYBER RISK Chapter 8: Managing the Brand When the Worst Occurs 129 Be Prepared 132 Chapter 9: Managing the Big Risk: Third-Party Vendors 145 Background Investigation Suggestions to Improve Process 149 Risk-Reinforced Service Level Agreements 154 Clouds Fill the Horizon 166 Notes 169 Chapter 10: Creating Executive Cyber Risk Councils 171 The Goal of the Executive Cyber Risk Council 175 Who Should Be Included in the Executive Risk Council? 176 Chapter 11: Early Warnings: Something Bad Is on the Way 185 Technical Signals Are There But You ve Got to Look 187 Know Who s Inside the Enterprise 190 What a Web We Weave ... When Surfing 192 About the Author 197 Index 199