Cyber Mayday and the Day After

Book description

Successfully lead your company through the worst crises with this first-hand look at emergency leadership

Cyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event, these incidents highlighted the centrality of competent crisis leadership.

Cyber Mayday and the Day After offers readers a roadmap to leading organizations through dramatic emergencies by mining the wisdom of C-level executives from around the globe. It’s loaded with interviews with managers and leaders who've been through the crucible and survived to tell the tale.

From former FBI agents to Chief Information Security Officers, these leaders led their companies and agencies through the worst of times and share their hands-on wisdom. In this book, you’ll find out:

  • What leaders wish they'd known before an emergency and how they've created a crisis game plan for future situations
  • How executive-level media responses can maintain – or shatter – consumer and public trust in your firm
  • How to use communication, coordination, teamwork, and partnerships with vendors and law enforcement to implement your crisis response

Cyber Mayday and the Day After is a must-read experience that offers managers, executives, and other current or aspiring leaders a first-hand look at how to lead others through rapidly evolving crises.

Table of contents

  1. Cover
  2. Praise for Cyber Mayday and the Day After
  3. Title Page
  4. Copyright
  5. Introduction: Setting the Global Stage for Cyber Resilienceintroduction
    1. A NEW SENSE OF CYBER URGENCY
    2. A PEEK BEHIND THE CURTAINS, AND THE MAKING OF CYBER MAYDAY AND THE DAY AFTER
    3. THE THREE-PART BREAKDOWN
    4. NOTES
  6. PART I: A Leader's Guide to Preparing for the Inevitable
    1. CHAPTER 1: If I Had a Time Machine
      1. STARTING WITH THE UNKNOWNS – OR NOT?
      2. AN ISOLATED PERSPECTIVE HAS MANY LIMITS
      3. LEARNING FROM OUR PAST TO LEAD OUR FUTURE
      4. FREQUENT RANSOMWARE ATTACKS PROMPT RESPONSE CAPABILITY ENHANCEMENTS IN NEW YORK STATE
      5. LIKE A BAD PENNY
      6. EDUCATION SECTOR TARGETED BY CYBERCRIMINALS
      7. THE BATTLE CONTINUES
      8. FIVE TAKEAWAYS
      9. NOTES
    2. CHAPTER 2: Fail to Plan or Plan to Fail: Cyber Disruption Response Plans and Cyber Insurance
      1. THE MAKING OF THE MICHIGAN CYBER INITIATIVE
      2. CONFRONTING CYBER EMERGENCIES: THE MICHIGAN CYBER DISRUPTION RESPONSE PLAN
      3. U.S. FEDERAL GOVERNMENT GUIDANCE ON SECURITY INCIDENT HANDLING
      4. POSITIVE SECURITY AND RISK MANAGEMENT FOR INTERNATIONAL ORGANIZATIONS
      5. CHANGES IN THE PLANNING APPROACH POST-INCIDENT
      6. THE WISCONSIN GOVERNMENT APPROACH TO CYBERSECURITY INCIDENT RESPONSE
      7. A PRIVATE SECTOR PERSPECTIVE ON COMPUTER SECURITY INCIDENT RESPONSE
      8. INCIDENT RESPONSE AND CYBER INSURANCE
      9. NOTES
    3. CHAPTER 3: Practice Makes Perfect: Exercises, Cyber Ranges, and BCPs
      1. THE IMPORTANCE OF CYBER EXERCISES
      2. HISTORY OF CYBER STORM EXERCISES
      3. MICHIGAN PARTICIPATION IN CYBER STORM I
      4. CYBER SCENARIOS, EXERCISE PLANS, AND PLAYBOOKS
      5. HELP AVAILABLE, FROM A CYBER RANGE NEAR YOU
      6. INTERNAL BUSINESS CONTINUITY PLANNING (BCP) PLAYERS
      7. DESIGNING YOUR BCP IN ACCORDANCE WITH YOUR COMPANY'S MISSION
      8. WHERE NEXT WITH YOUR BCP?
      9. HOW OFTEN SHOULD WE BE RUNNING OUR BCPs?
      10. AUTOMATED RESPONSES TO INCIDENTS
      11. NOTES
    4. CHAPTER 4: What a Leader Needs to Do at the Top
      1. BUILDING RELATIONSHIPS WITH YOUR BUSINESS LEADERS
      2. SPEAK THEIR LANGUAGE
      3. LAYING THE GROUNDWORK
      4. SECURITY VARIANCE
      5. THE FUNDAMENTALS AND TOP MITIGATION STRATEGIES
      6. SECURITY NEEDS TO HAVE A BUSINESS PURPOSE
      7. FIGHTING THE INNATE NATURE OF A CISO
      8. HOW SHOULD A SENIOR EXECUTIVE APPROACH CYBER ISSUES?
      9. WHAT CAN THE BOARD CHANGE?
      10. STORY-BASED LEADERSHIP
      11. SETTING A SUPPORTIVE CULTURE LEADS TO CREATIVE SOLUTIONS
      12. NOTES
  7. PART II: Cyber Mayday: When the Alarm Goes Off
    1. CHAPTER 5: Where Were You When the Sirens Went Off?
      1. THE STORY OF TOLL
      2. FINE-TUNE YOUR BCP
      3. CYBER CRISIS IN PANDEMIC TIMES
      4. MICROSCOPIC LESSONS – DAY ONE OF THE INCIDENT
      5. THE RECOVERY
      6. IMPROVEMENT WITH HINDSIGHT
      7. THIRD-PARTY RISKS AND CYBER INSURANCE
      8. EFFECTIVE LEADERSHIP IN TIMES OF CRISIS
      9. A SUPPORTIVE MANAGEMENT HELPS BRING RESULTS
      10. NOTES
    2. CHAPTER 6: Where Do We Go When the Power Goes Off?
      1. ASSESSING THE SITUATION
      2. ESTABLISHING ORDER
      3. CYBER TEAMWORK DURING A BLACKOUT
      4. STEPPING BACK TO STEP FORWARD
      5. PEOPLE, PROCESS, AND TECHNOLOGY IN CYBER EMERGENCIES
      6. CISO MINDSET REGARDING SECURITY INCIDENTS
      7. DEFINING SECURITY OPERATIONS?
      8. MEASURING RESULTS: KEY PERFORMANCE INDICATORS
      9. INFORMATION SHARING
      10. STRENGTHENING PLAYBOOKS
      11. MULTI-STATE SECURITY OPERATIONS5
      12. NOTES
    3. CHAPTER 7: Teamwork in the Midst of the Fire
      1. A BIG STEP BACK – AND ANALYZING WHAT WENT RIGHT AND WRONG WITH THE JCTF PROCESSES
      2. A PRIVATE SECTOR INCIDENT WITH A (SOMEWHAT) HAPPY ENDING
      3. GREAT LEADERS FOSTER TEAMWORK – BUT HOW?
      4. SEVEN TIPS TO IMPROVE TEAMWORK
      5. NOTES
    4. CHAPTER 8: What Went Right?
      1. SWIFTNESS MATTERS
      2. PROACTIVE LEADERSHIP AND TRANSPARENCY AS KEY FACTORS
      3. AVIATION INDUSTRY LESSONS FROM A CRISIS COMMUNICATIONS RESEARCHER
      4. COMMUNICATING CYBER CRISIS WITH CONSOLE
      5. MEET THE WORLD'S FIRST CISO
      6. THE BASIC KEYS OF DISASTER RESPONSE
      7. THE PROBLEM WITH MISINFORMATION
      8. THE STOCKWELL TUBE INCIDENT
      9. NOTES
  8. PART III: The Day After: Recovering from Cyber Emergencies
    1. CHAPTER 9: The Road to Recovery
      1. CYBER MINDSETS FROM A WAR ZONE
      2. HINDRANCES TO AVOID
      3. ASYMMETRIC HYBRID WARFARE (AHW)
      4. THE ROAD TO NO RECOVERY
      5. THE FIRST STEP IN COMMUNICATION
      6. THE FOUR STEPS OF A CRISIS-READY FORMULA
      7. KEY ACTIONS FOR RECOVERY
      8. NOTES
    2. CHAPTER 10: What Went Wrong – How Did We Miss It?
      1. MISTAKES AND SOLUTIONS IN WISCONSIN
      2. HOSPITAL RANSOMWARE – AND LEARNING FROM MISTAKES
      3. HOW OVERCONFIDENCE CAN IMPACT ORGANIZATIONAL SECURITY AND CAUSE DATA BREACHES
      4. REFLECTING ON INCIDENTS WITH A MENTOR
      5. NOTES
    3. CHAPTER 11: Turning Cyber Incident Lemons into Organizational Lemonade
      1. ARE WE LEARNING FROM THESE TRUE STORIES?
      2. CALLS FOR MORE RESILIENCE AND DOING MUCH BETTER
      3. MORE LESSONS LEARNED
      4. BACK TO THE BEGINNING: A CIRCULAR APPROACH TO INCIDENT RESPONSE DURING CYBER EMERGENCIES
      5. A HELPFUL HOSPITAL EXAMPLE
      6. MAKING LEMONADE
      7. FIVE LESSONS FROM THE HOSPITAL ATTACK
      8. FIVE LESSONS FROM DIVERSE INFORMATION SHARING AND ANALYSIS CENTERS (ISACs)
      9. BRINGING IT ALL TOGETHER
      10. THE ECOSYSTEM VIEW
      11. LEADING BY EXAMPLE
      12. NOTES
  9. Free Cyber Incident Resources
    1. CYBER INCIDENT RESPONSE PLANNING AND PLANS
    2. STANDARDS, FRAMEWORKS, AND POLICIES
    3. EXERCISE TEMPLATES
    4. CYBER STRATEGY DOCUMENTS
    5. INCIDENT RESPONSE PLAYBOOKS
    6. CERT RESOURCES
    7. CYBER INSURANCE GUIDANCE
    8. LESSONS LEARNED DOCUMENTS
    9. TRAINING OPPORTUNITIES, INCLUDING CYBER RANGES
    10. LAWS AND REPORTING ON DATA BREACHES AND PROTECTING DATA
    11. CRISIS COMMUNICATIONS
  10. Acknowledgments
  11. About the Authors
  12. Index
  13. End User License Agreement

Product information

  • Title: Cyber Mayday and the Day After
  • Author(s): Daniel Lohrmann, Shamane Tan
  • Release date: November 2021
  • Publisher(s): Wiley
  • ISBN: 9781119835301