We are increasingly dependent on information technology that leaves us vulnerable to cyber threats from around the world. These threats include cyberwar between nations, cyberterrorism aimed at influencing policies through violence, and cyberespionage to steal trade secrets and intellectual property. While attribution of attacks is difficult under international law, organizations can help manage these risks by not becoming an easy target, obtaining threat intelligence, assuming compromise will occur, and responding appropriately to incidents.