Search CIO.com






Home > Research Centers > Security and Privacy > Responding to Problems




After an Incident
Reporting Cybercrimes
Agencies to Contact



Advertisers
After an Incident


It's Not Easy Being Breached
Surviving a security incident is just the beginning. Then you need to figure out what it really cost.
December 9, 2002 - CSO


Practice Makes Perfect
As one of the nation’s largest insurance companies, USAA is in the business of managing risk. So it makes sense that—when faced with a disaster—the company knows how to respond.
November 8, 2002 - CSO


Staying Power
In the weeks and months after 9/11, three CIOs working next door to the World Trade Center found they had to be strong leaders to get their companies back online. Now back in the city, they don't make business continuity plans. They live them.
September 1, 2002 - CIO


Watching the Detectives
Computer forensics can help companies uncover the digital truth
June 1, 2002 - CIO


The Truth About Cyberterrorism
The real threat is to critical data, not to property. That's what CIOs should be focusing on.
March 15, 2002 - CIO


How to Plan for the Inevitable
Think you can't afford to create an incident response plan? Think again. Here's a budget-conscious guide to getting started.
March 15, 2002 - CIO


The Secret Service's Bob Weaver on Preparing for the New World Disorder
On Sept. 11 the office of the Secret Service was destroyed. In two days, it was fully operational. Bob Weaver, head of the New York Electronic Crimes Task Force shows what it means to respond to terrorism.
March 1, 2002 - Darwin


How to Not Recover from Getting Hacked (A Loser's Guide to Failure)
A tongue-in-cheek guide on what not to do after a security incident.
January 1, 2002 - CIO


Effective Responses to Security Incidents
This presentation from Abbie Lundberg, Editor in Chief, CIO, includes how to get the best return for your effort, incident response plans, types of incidents to report and which agencies to call for different types of events. (PowerPoint)
December 2001 - CIO


Nasdaq's Best Practices
NASDAQ, whose 1 Liberty Plaza headquarters is next to the World Trade Center, has itemized lessons learned from the Sept. 11 terrorist attacks.
December 1, 2001 - CIO


At the Center of a New World
On Sept. 11, two ordinary people—New York's new acting CIO, and the local Red Cross' IT leader—rose to an extraordinary occasion, a time when every action counted. Here's what they did and where they go from here.
November 15, 2001 - CIO


Security planning: Don't press the panic button
You've just been hacked. Now what? Here's how to avoid resorting to panic mode.
September 2001 - Darwin


Outbreak
In 2000, computer viruses caused more than $17 billion in damage to businesses worldwide. Read one CIO's story to prevent an invasion in your company.
June 1, 2001 - CIO


IT Autopsy
Computer forensics blossoms into a science all its own.
March 1, 2001 - CIO


Empire Strikes Back
Once an easy target for computer-aided fraud, a health insurer fights fire with fire—digging deep into its database to find the filchers and recover millions.
July 1, 1998 - CIO


Reporting Cybercrimes


Fear Factor
A reality check on your top five concerns about reporting security incidents.
October 15, 2002 - CIO


Is Cybercrime Really Underreported?
ALARMED
The prevailing wisdom is that most companies don’t report computer attacks. But when is a crime a crime?
August 15, 2002 - CIO.com


They Want You for a Safer Infrastructure
Richard Clarke and Howard Schmidt are coordinating a volunteer effort to try to protect the nation's critical infrastructure. Can they convince corporate America to play along?
June 15, 2002 - CIO


CIO Cyberthreat Response & Reporting Guidelines
CIO magazine worked with the Secret Service, the FBI and industry leaders to create guidelines for reporting security incidents — what to report, who to report it to, and how. You will need Adobe Acrobat reader to view this PDF file.


A Not-So-Secret Service
ALARMED
A Secret Service task force, now a model for the nation, aims to get involved before cybercrimes occur
January 4, 2002 - CIO.com


Break Glass, Pull Handle, Call FBI
If you're the victim of a security breach or a virus attack, get the feds on your side.
June 1, 2001 - CIO


The Feds'll Come A-Snoopin'
The U.S. Department of Justice releases new guidelines for cases involving computer crimes—and gives agents a lot of leeway.
January 12, 2001 - Wired


Sweat About the Threat
The FBI is spearheading a new effort to defend against the ravages of information warfare. But are you ready to trust security to the feds?
December 1, 1998 - CIO


Agencies to Contact


Critical Infrastructure Assurance Office
CIAO focuses on developing a national plan for protecting the government's critical infrastructure, as well as education initiatives regarding that infrastructure.


Electronic Crimes Taskforce
The U.S. Secret Service's public/private information sharing effort.


Infragard
Public/private information sharing effort led by the FBI and the NIPC.


National Infrastructure Protection Center
A focal point for threat assessment, warning, investigation and response for threats or attacks against U.S. critical infrastructures.


CCIPS
The website for the Computer Crime and Intellectual Property Section of the U.S. Department of Justice.


The CERT Coordination Center
Website for the CERT Coordination Center at Carnegie Mellon University, a major reporting center for Internet and network security vulnerabilities.



We welcome your feedback!

Send suggestions,
ideas, and comments to:

Sarah Scalet
sscalet@cio.com

For technical issues:

Kathleen Kotwica
kkotwica@cio.com

Suggestion Box:

Find what you were looking for?
Yes No

Add your input!







In the Security & Privacy Research Center:
Alarmed
Top 10 Viruses
What to Track
Technology
Rules & Regs
Prevent
Respond
Glossary
Metrics
CIO Radio
Q&A
Books
Events
Free Newsletter




Dated: December 11, 2002
http://www.cio.com/research/security//response.html


About CIO.com | Welcome | Privacy Policy | User Agreement | Linking to us

CIO.COM complies with the ASME Guidelines with IDG extensions for new media.

Linking to this site is not considered duplication.
We invite you to link to this or any of our pages.

CIO magazine chief information officer ERP strategy IT research analysis business technology management e-business knowledge management intranet CRM cio.com CRM customer relationship management e-business ERP enterprise resource management leadership management measuring IT value outsourcing supply chain

© 1994 - 2002 CXO Media Inc.

An International Data Group (IDG) Company


Problems/complaints/compliments about this site can be sent to thorgan@cio.com.