  {"id":17163,"date":"2016-11-18T17:06:35","date_gmt":"2016-11-18T22:06:35","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/citibank-defending-against-cyber-threats\/"},"modified":"2016-11-18T17:16:31","modified_gmt":"2016-11-18T22:16:31","slug":"citibank-protecting-against-cyber-threats","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/","title":{"rendered":"Citibank: Protecting Against Cyber Threats"},"content":{"rendered":"<p>Digital technology has crept into nearly every aspect of society, offering unprecedented access to information and services while also creating massive cyber security challenges that leave many of the most personal and most important aspects of our lives vulnerable to cyber attack.\u00a0 In an age where digitalization and interconnectivity has been introduced into everything from everyday items such as watches to thermostats through the \u201cInternet of Things\u201d to the most important elements of our national infrastructure, including financial institutions and electrical power grids, it is imperative for the private and public sectors to take action and protect the underlying structure of our society.<\/p>\n<p>Over the last decade, we have seen several examples of the vulnerabilities in an increasingly digitalized world such as the 2007 coordinated cyber attacks on Estonia<sup>1<\/sup>, the 2014 hack of Sony Pictures<sup>2<\/sup>, and the 2015 attack that disabled a regional power grid in Ukraine.<sup>3<\/sup> \u00a0Cyber crime alone is estimated to cost businesses $400 billion per year and British insurance company Lloyd\u2019s estimates that amount to quadruple to $2 trillion by 2019,<sup>4<\/sup> and businesses are taking notice.\u00a0 For example, IBM\u2019s CEO, Ginni Rometty stated last year that \u201ccyber crime is the greatest threat to every company in the world.\u201d<sup>5<\/sup>\u00a0 In this environment, Citibank is taking action to mitigate cyber threats.<\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/MI-CL224_CITI_GR_20150817192929.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17159 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/MI-CL224_CITI_GR_20150817192929-1024x668.jpg\" alt=\"mi-cl224_citi_gr_20150817192929\" width=\"479\" height=\"312\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/MI-CL224_CITI_GR_20150817192929-1024x668.jpg 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/MI-CL224_CITI_GR_20150817192929-300x196.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/MI-CL224_CITI_GR_20150817192929-768x501.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/MI-CL224_CITI_GR_20150817192929-600x391.jpg 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/MI-CL224_CITI_GR_20150817192929.jpg 1242w\" sizes=\"auto, (max-width: 479px) 100vw, 479px\" \/><\/a><\/p>\n<p><strong>New Business Model, Vulnerabilities Exposed<\/strong><\/p>\n<p>Like others, Citibank has increasingly migrated services onto digital platforms for efficiency, speed, and customer convenience.\u00a0 This represents a massive shift in the business model which originally relied heavily on personnel and infrastructure.\u00a0 Now, instead of depending on methods like writing physical checks or visiting a teller, customers have 24\/7 access to account information from virtually anywhere and access to services electronically.<\/p>\n<p>However, that transition has not been without challenges.\u00a0 For example, in 2011, Citibank was hacked and \u201cthe financial data of more than 360,000\u201d credit card holders was exposed.<sup>6<\/sup>\u00a0 A month later, Citibank revealed that \u201cabout $2.7 million was stolen\u201d from a portion of those accounts.<sup>7<\/sup> \u00a0The chart below shows the financial services industry has the second highest average annualized cost of cyber attacks demonstrating the scale and cost consequences of the threat.<sup>8<\/sup>\u00a0 Cyber attacks will continue to target the industry and Citibank needs to adapt its operating model to this challenge.<\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Annualized-Cost-of-Cyberattack-Charts.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17189 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Annualized-Cost-of-Cyberattack-Charts.jpg\" alt=\"annualized-cost-of-cyberattack-charts\" width=\"559\" height=\"376\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Annualized-Cost-of-Cyberattack-Charts.jpg 559w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Annualized-Cost-of-Cyberattack-Charts-300x202.jpg 300w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/a><\/p>\n<p><strong>Innovation and Adaptation<\/strong><\/p>\n<p>Citibank has adapted its operating model to address the vulnerabilities of that digital transition to add protection and thus, value for customers that can trust the integrity of their bank.\u00a0 These measures include:<\/p>\n<ul>\n<li><u>Common-sense and oversight<\/u>: implementing common-sense measures to protect against \u201cinsider threats\u201d by controlling information access, requiring \u201cmultiple levels of approval,\u201d monitoring transactions, and training staff to recognize and respond to threats.<sup>9<\/sup><\/li>\n<\/ul>\n<ul>\n<li><u>IT Discipline<\/u>: maintaining \u201cdiscipline and vigilance by IT and end-users\u201d such as ensuring up-to-date software.<\/li>\n<\/ul>\n<ul>\n<li><u>Three Pillars of Defense<\/u>:<\/li>\n<\/ul>\n<ol>\n<li>Channel Protection: enabling Citibank\u2019s systems to \u201c[block] an attacker\u2019s entry to a platform\u201d through tactics like \u201cstrong log-in credentials\u201d and encrypted data transfer.<\/li>\n<li>Vigilance About Payment Outliers: using resources likes Citi\u2019s Payment Risk Manager to detect payment outliers that may identify a compromise of Citibank\u2019s systems.<\/li>\n<li>Data Privacy:\u00a0 protecting the most valuable and confidential data on Citi\u2019s networks through a \u201cdata privacy policy and data governance function\u201d that ensures appropriate levels of information access and security.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-1.23.19-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17279 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-1.23.19-AM.png\" alt=\"screen-shot-2016-11-18-at-1-23-19-am\" width=\"545\" height=\"274\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-1.23.19-AM.png 930w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-1.23.19-AM-300x151.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-1.23.19-AM-768x386.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Screen-Shot-2016-11-18-at-1.23.19-AM-600x302.png 600w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><\/a>Separately, Citibank has emphasized <u>innovation<\/u> in cyber security because \u201ccyber-crime is constantly evolving as current attacks become known and dealt with.\u201d\u00a0 In this spirit, Citibank has partnered with Microsoft to implement \u201cnext generation identity technology\u201d for its employees and users.<\/p>\n<p><strong>Inter-Bank Cooperation<\/strong><\/p>\n<p>Beyond its individual efforts, Citibank has joined forces with seven other banks, including J.P. Morgan, Goldman Sachs, and Bank of America, to form a group within the non-profit Financial Services Information Sharing and Analysis Center (FS-ISAC) to \u201cshare cyber crime data\u201d and collectively gain the benefits of shared information.<sup>10<\/sup> \u00a0Citibank explains, \u201cSharing knowledge of anomalies or updates, or even of attackers\u2019 activities, makes every part stronger.\u00a0 [. . .] Real-time highly-detailed, analysis enables banks and companies to detect patterns and stay (at least) one step ahead of attackers.\u201d<sup>9<\/sup>\u00a0 Strengthening and investing in this group\u2019s development will benefit all partners through sharing of data, experience, and best practices.<\/p>\n<p><strong>Moving Forward<\/strong><\/p>\n<ul>\n<li>Cyber security is a complex, large-scale issue that cannot be solved by one company or the government acting alone.\u00a0 Because of the interconnectedness of the private and public sector and shared vulnerabilities, it is vital that Citibank and other financial firms demand, but also commit to closer cooperation with each other as well as with government to find solutions.<\/li>\n<\/ul>\n<ul>\n<li>The group of eight banks should share information and lessons learned with smaller banks when appropriate.\u00a0 While they banded together because of their relative size and system complexity, the industry as a whole can benefit from their work.<\/li>\n<\/ul>\n<ul>\n<li>Finally, Citibank should focus on developing talent to provide critical innovation and expertise in the coming years.<\/li>\n<\/ul>\n<p>(799 words)<\/p>\n<p>Sources:<\/p>\n<p>[1] Washington Post. 2016. <em>Cyber Assaults on Estonia Typify a New Battle Tactic<\/em>. [ONLINE] Available at: <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2007\/05\/18\/AR2007051802122.html\">http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2007\/05\/18\/AR2007051802122.html<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[2] Washington Post. 2016. <em>U.S. attributes cyberattack on Sony to North Korea &#8211; The Washington Post<\/em>. [ONLINE] Available at: <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/us-attributes-sony-attack-to-north-korea\/2014\/12\/19\/fc3aec60-8790-11e4-a702-fa31ff4ae98e_story.html\">https:\/\/www.washingtonpost.com\/world\/national-security\/us-attributes-sony-attack-to-north-korea\/2014\/12\/19\/fc3aec60-8790-11e4-a702-fa31ff4ae98e_story.html<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[3] WIRED: WIRED. 2016. <em>Inside the Cunning, Unprecedented Hack of Ukraine\u2019s Power Grid | WIRED<\/em>. [ONLINE] Available at: <a href=\"https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/\">https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[4] Forbes. 2016. <em>Forbes<\/em>. <em>Cyber-crime Cost Projected to Reach $2 Trillion by 2019. <\/em>[ONLINE] Available at: <a href=\"http:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/01\/17\/cyber-crime-costs-projected-to-reach-2-trillion-by-2019\/#6ff24583bb0c\">http:\/\/www.forbes.com\/sites\/stevemorgan\/2016\/01\/17\/cyber-crime-costs-projected-to-reach-2-trillion-by-2019\/#6ff24583bb0c<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[5] Forbes. 2016. <em>Forbes<\/em>. <em>IBM&#8217;s CEO on Hackers: Cyber-crime is the Greatest Threat to Every Company in the World.<\/em>[ONLINE] Available at: <a href=\"http:\/\/www.forbes.com\/sites\/stevemorgan\/2015\/11\/24\/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world\/#47d09fd93548\">http:\/\/www.forbes.com\/sites\/stevemorgan\/2015\/11\/24\/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world\/#47d09fd93548<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[6] WIRED: WIRED. 2016. <em>Citi Credit Card Hack Bigger Than Originally Disclosed | WIRED<\/em>. [ONLINE] Available at: <a href=\"https:\/\/www.wired.com\/2011\/06\/citibank-hacked\/\">https:\/\/www.wired.com\/2011\/06\/citibank-hacked\/<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[7] CNNMoney. 2016. <em>Citi: Last month&#8217;s credit card hack attack stole millions &#8211; Jun. 27, 2011<\/em>. [ONLINE] Available at: <a href=\"http:\/\/money.cnn.com\/2011\/06\/27\/technology\/citi_credit_card\/\">http:\/\/money.cnn.com\/2011\/06\/27\/technology\/citi_credit_card\/<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[8] Giles Turner. 2016. <em>Cybersecurity Index Beats S&amp;P 500 by 120%. Here\u2019s Why, in Charts &#8211; MoneyBeat &#8211; WSJ <\/em>. [ONLINE] Available at: <a href=\"http:\/\/blogs.wsj.com\/moneybeat\/2015\/09\/09\/cybersecurity-index-beats-sp-500-by-120-heres-why-in-charts\/\">http:\/\/blogs.wsj.com\/moneybeat\/2015\/09\/09\/cybersecurity-index-beats-sp-500-by-120-heres-why-in-charts\/<\/a>. [Accessed 18 November 2016].<\/p>\n<p>[9] Citibank Treasury and Trade Solutions Article, \u201cFighting cyber-crime together,\u201d December 2014. Available at: <a href=\"https:\/\/www.citibank.com\/tts\/about_us\/articles\/docs\/...\/article_fighting_cybercrime.pdf\">https:\/\/www.citibank.com\/tts\/about_us\/articles\/docs\/&#8230;\/article_fighting_cybercrime.pdf<\/a>. [Accessed 17 November 2016].<\/p>\n<p>[10] Fortune. 2016. <em>Wall Street&#8217;s Biggest Banks Are Banding Together Against Cybercrime<\/em>. [ONLINE] Available at: <a href=\"http:\/\/fortune.com\/2016\/08\/10\/wall-streets-biggest-cyber\/\">http:\/\/fortune.com\/2016\/08\/10\/wall-streets-biggest-cyber\/<\/a>. [Accessed 18 November 2016].<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an age where digitalization has been introduced into everyday items and the most important elements of our national infrastructure such as financial institutions and electrical power grids, how are private sector firms like Citibank protecting against cyber security threats?<\/p>\n","protected":false},"author":1941,"featured_media":17176,"comment_status":"open","ping_status":"closed","template":"","categories":[2454,2455,845,2309],"class_list":["post-17163","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-citibank","category-cybercime","category-cybersecurity","category-hacking"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Citibank: Protecting Against Cyber Threats - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Citibank: Protecting Against Cyber Threats - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"In an age where digitalization has been introduced into everyday items and the most important elements of our national infrastructure such as financial institutions and electrical power grids, how are private sector firms like Citibank protecting against cyber security threats?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-18T22:16:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/BN-KB364_bkrvze_J_20150828144746.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"959\" \/>\n\t<meta property=\"og:image:height\" content=\"639\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/\",\"name\":\"Citibank: Protecting Against Cyber Threats - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/BN-KB364_bkrvze_J_20150828144746.jpg\",\"datePublished\":\"2016-11-18T22:06:35+00:00\",\"dateModified\":\"2016-11-18T22:16:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/BN-KB364_bkrvze_J_20150828144746.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/BN-KB364_bkrvze_J_20150828144746.jpg\",\"width\":959,\"height\":639},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/citibank-protecting-against-cyber-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Citibank: Protecting Against Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Citibank: Protecting Against Cyber Threats - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"Citibank: Protecting Against Cyber Threats - Technology and Operations Management","og_description":"In an age where digitalization has been introduced into everyday items and the most important elements of our national infrastructure such as financial institutions and electrical power grids, how are private sector firms like Citibank protecting against cyber security threats?","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/","og_site_name":"Technology and Operations Management","article_modified_time":"2016-11-18T22:16:31+00:00","og_image":[{"width":959,"height":639,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/BN-KB364_bkrvze_J_20150828144746.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/","name":"Citibank: Protecting Against Cyber Threats - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/BN-KB364_bkrvze_J_20150828144746.jpg","datePublished":"2016-11-18T22:06:35+00:00","dateModified":"2016-11-18T22:16:31+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/BN-KB364_bkrvze_J_20150828144746.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/BN-KB364_bkrvze_J_20150828144746.jpg","width":959,"height":639},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/citibank-protecting-against-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Citibank: Protecting Against Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/17163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/1941"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=17163"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/17163\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/17176"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=17163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=17163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}