SlideShare a Scribd company logo
Sony Pictures Entertainment, Inc.:
A Cybersecurity Attack from North Korea (A)
Cyberattack
November 24, 2014 began like most other days for Michael Lynton, Chief Executive Officer of
Sony Pictures Entertainment. Upon arriving at the office, Lynton received a call from CFO
David Hendler informing Lynton that Sony’s cybersecurity had been compromised. Employees
started their computers that morning only to find disturbing images of Lynton’s severed head
appear on their screens. Shortly after, Sony shut down all computer systems worldwide, issuing
the following statement: “We are investigating an I.T. matter.” 1
The next day, four of the studio’s unreleased movies were posted on pirate Web sites.
The hackers also claimed to have stolen approximately 100 terabytes of internal data, including
personal and confidential information from thousands of Sony Pictures employees.2
Lynton and
Sony executives could not have predicted that in three short weeks, the digital attack would be at
the center of a global controversy. In total, eight leaks released an estimated 38 million files and
thousands of personal, damaging e-mails belonging to Sony Pictures executives.3
According to
investigators, the magnitude of the data published was simply unprecedented in U.S. corporate
history.
Sony Pictures soon found its brand identity under scrutiny, making headlines in all major
news sources. Rich Klein, partner at McLarty Associates advisory firm, called the event “an
international crisis, the cyberattack that put Americans’ vulnerability on display, a free speech
cause, an Oval Office gut-check, and a cautionary tale for the future of warfare.” 4
Entering the Motion Picture Entertainment Business
Sony Pictures is a United States based subsidiary of Sony Corporation. Sony Corporation was
established in 1946 and based in Tokyo, Japan.5
In 1960, Sony Corporation of America was
established in the United States and was listed on the New York Stock Exchange in 1970. Late
in the Twentieth Century, Sony had become one of the world’s leading consumer electronics
manufacturers.
In 1991, Sony acquired Columbia Pictures Entertainment and renamed it Sony Pictures
Entertainment, Inc., (SPE). In 2004, Michael Lynton joined SPE as Chairman and Chief
Executive Officer. That same year, Amy Pascal was promoted to Chairman of the Motion
Picture Group, and to Co-Chairman of SPE two years later. In 2006, SPE crossed the $1 billion
mark in domestic box-office receipts for the fifth year in a row.6
Sony pledged to operate SPE as independently as possible. The motion picture business
represents 10% of revenue for the parent corporation. Although SPE provides just a small
fraction of the company’s total income, the motion picture business bears Sony’s name, which
carries major implications for the Sony brand.
Size and Scope of Sony Motion Picture Entertainment
The entertainment division is one of the most profitable sectors of the company. Sony Motion
Pictures has retained profits between 4% and 7% in recent years, while the electronics divisions
have operated consistently in the red.7
In the fiscal year ending March 31, 2014, Sony Pictures
reported $8 billion in revenue.8
(See Appendix A).
Sony is a major player in the motion picture industry with 199 completed movies.9
Sony
Motion Pictures Entertainment retains an estimated 12.2% of market share, which can be
compared to 20th
Century Fox (17.3%), Buena Vista (15.6%), and Warner Bros (15.1%). In sum,
these four enterprises account for approximately 60% of the total market. Universal and
Paramount – other well-known players – both lag behind Sony with respect to market share.10
(See Appendix B for additional industry information.)
Technology Revolutionizes the Filmmaking Business
New video technology has revolutionized the way movies are made. Historically, 35mm film
was the standard for producing, distributing, and displaying motion pictures. This required the
physical film to be copied and distributed to theaters. In 2002, Star Wars: Episode II led the
charge as the first movie shot entirely on digital video.11
This helped inspire an entire digital
generation of producers and editors, offering cost savings in both time and money and flexibility
and simplicity in post-production edits.
Digital movies are essentially very large computer files that theaters are able to play on
as many movie screens as they desire. In years past, a theater was dependent on the number of
film reels that could be manually delivered to them. Now, via satellite delivery, theaters have
much greater flexibility, which affords the capability to match screen decisions to consumer
demand. In 2013, the Digital Cinema Distribution Coalition provided digital distribution
technologies to more than 1,200 theaters and 17,000 screens.12
While digital movie distribution has major benefits, it does not come without its drawbacks and
risks. Enhanced security protocols, such as encryption techniques, are necessary to help prevent
piracy. Distribution, a critical component of the movie industry, has also changed as a result,
requiring theaters to invest in new digital projection equipment. This investment represents a
large capital expenditure for theaters, costing as much as $70,000 per screen for a digital cinema
retrofit.13,14
Fortunately, studios and distributors have helped theaters offset such costs due to the
importance of digital distribution. Sony Pictures, for example, relies on exhibitors to generate
box office sales. The risk is assumed by exhibitors who choose to turn screens over to Sony and
rely on Sony to drive consumer demand and produce box office hits.
2
2014: The Year of Cybersecurity Attacks
The digital age has led to a new era of crime and theft of corporate assets. Companies now store
important data such as corporate assets, company records, and customer information digitally.
This lends itself to the possibility that hackers could retrieve this valuable information if proper
security standards are not set and followed.
The year 2014 was popular for corporate data theft. Target, Snapchat, Forbes, Michael’s,
eBay, Home Depot, and USPS all suffered major data breaches. CNBC has estimated that over
one billion personal data records were compromised that year as a result of approximately 1,500
incidents. This is a 78% increase from 2013.15
Hackers were able to retrieve everything from
users’ e-mail messages, passwords, and credit card information, to employee data and phone
numbers.16
The cyberattacks were designed to access customers’ financial accounts, as well as
sensitive information that might allow identity theft. The Target hack, for example, resulted in
the online auction of 2 million credit cards, allowing hackers to steal some $53 million.17
Trends
in data hacking reveal that cybercriminals are shifting focus from short-term credit card theft to
long-term identity theft, which helps to create sustainable revenue streams.18
Sony’s Data Protection Controls
Security experts examining Sony’s malware discovered that the hackers were familiar with
Sony’s network long before the breach occurred. Evidence suggests that the attackers gained
control of Sony’s private cryptographic keys, which secured encrypted information. Control of
these keys allowed suspicious movements of data to go undetected.
Historically, Sony has been a popular target for hackers. In 2011, account information of
77 million Sony Playstation users was stolen.19
It was reported that Sony was threatened in
advance of this breach and failed to implement adequate safeguards to protect it,20
even though it
is a company’s responsibility to change their keys frequently, especially after notification of
vulnerabilities.
A class-action complaint was filed against Sony in response to the 2014 cyberattack. The
complaint alleges that, “Sony failed to secure its computer systems, servers, and databases
(‘Network’), despite weaknesses that it has known about for years . . . .” and, “Sony
subsequently failed to timely protect confidential information of its current and former
employees from law-breaking hackers . . . .” 21
The Interview: A Comedy
SPE was in the final preparations for launching The Interview to theaters nationwide when the
cyberattack occurred. The movie, a fictional comedic film depicting the attempted assassination
of North Korean leader Kim Jong-un, starred Seth Rogen and James Franco. It was directed by
Evan Goldberg and Seth Rogen. Sony invested $44 million in production, and the movie was
3
projected to bring in $90 million in revenue, based on a strong record of comedies starring Seth
Rogen.22
Sony embarked on a major marketing campaign prior to the movie’s winter premiere.
Advertising costs were estimated to reach nearly $30 million.23
Sony Corporation CEO Kazuo Hirai voiced concerns soon after learning about the film’s
plot because of Japan and North Korea’s tense bilateral relationship. Hirai sent formal demands
to Pascal and the team to change parts of the film after receiving warnings from North Korean
news agencies in June of 2014.24
Sony executives worked with government think tanks to talk about possible political
consequences. The company made some changes, such as using “Columbia Pictures” instead of
the Japanese Sony brand. Direct retribution from North Korea was simply not envisioned as a
credible threat.25
Various entertainment media reported that studio executives questioned
whether The Interview should refer to the real North Korean regime or, perhaps, a fictitious
dictator.26
After consulting with several experts, Lynton was told the film was safe to release.
The movie was set to premiere on Christmas Day, December 25, 2014, at all major
cinemas across the United States. The launch plan included premieres in 10 other countries
within the following eight weeks.27
(See Appendix C for the movie poster.)
North Korea’s Involvement
The Democratic People’s Republic of Korea is a rigidly authoritarian state that has been led by
the Kim family for more than 60 years.28
North Korea maintains strict government controls over
its citizens, including many that are thought to violate basic human rights. Draconian laws
involving severe punishment enforce citizen loyalty to the North Korean regime. Although
North Korea limits access to the Internet, the nation maintains a robust corps of computer
hackers.29
The North Korean regime chooses some of its best talent for cyberwarfare training
and allocates substantial resources to maintain and develop the program. “Cyberwarrior,” in
fact, is a highly coveted government position.30
North Korea’s reaction to The Interview reflects the unusually strict ideology of the
country. The movie parodied the country’s leader and his imagined assassination. The depiction
of Kim Jong-un and his dynasty as fallible – an impossible and frightening image to the regime –
likely helped to inspire calls for retribution.31
Credible, material evidence gathered following the
data breach indicates that the hackers engineered the attack to damage Sony’s computer systems
and to humiliate the company, thereby proving their loyalty to Kim Jong-un. This objective
differs from the majority of corporate hacks, which focus on financial gain.
On December 19th
, the United States government was able to confirm that the hack originated in
North Korea. Investigators found significant overlap between the digital fingerprints of the Sony
attack to other North Korean cyberattacks on South Korean banks. The U.S. stated that it
viewed the event as a “serious national security matter.” 32
4
The Aftermath of the Cyberattack
In the immediate aftermath of the cyberattack, Sony’s communication system was shut down.
Senior executives quickly implemented alternative communication networks at the company,
leveraging phone trees, notepads, and outdated cell phones. The compromised system at Sony
Pictures took weeks to restore. The hackers not only stole Sony’s data, but had completely
erased it.
The attackers threatened to leak Sony movies as well as thousands of internal documents
and the personal information of more than 47,000 people, including employees, freelancers, and
movie stars. They did not identify themselves or issue specific demands. Although it was
suspected that the hack was perpetrated by North Korean cybercriminals, officials of the DPRK
denied all allegations. This made it difficult to communicate details surrounding the attack to
employees and external parties.
The crisis-management team at Sony Pictures set up desks to help employees with credit
protection and fraud alerts. The team also set up new e-mail accounts and telephone numbers.
They were doing what they could to shift all digital systems back to traditional pen-and-paper
methods; however, it seemed to be too late. The hackers already had accessed all the data they
needed to irrevocably damage Sony’s reputation.
Leadership
Sony Corporation CEO Kazuo Hirai played a negligible media role during the attack, preferring
to place his confidence in Lynton and Pascal. However, Hirai claimed he signed off on all
external communication and decisions made with regards to the cyberattack.33
CEO Michael
Lynton, reserved and analytical, was forced to jump into the spotlight, shadowing Motion Picture
Chief, Amy Pascal, who had long been the “face of Sony Pictures.” Pascal’s credibility had
deteriorated after several of her e-mails surfaced on December 8th
and 10th
, which included
celebrity insults and racist comments involving President Obama. 34
Sony leadership promised employees that they would receive an e-mail outlining steps to
sign up for identity protection services. Two days after the promised e-mail, 47,426 unique
social security numbers and other personal information of more than 15,000 current and former
Sony employees were leaked.35
(Appendix D outlines details of this memo.)
Sony took a gamble when deciding how to respond to the cyberattack. Several
employees would later allege that Sony knew about the risks to its digital storage and the
geopolitical sensitivity of The Interview but chose to make decisions that were not in the best
interest of Sony employees.
5
In response to the allegations that Sony did not react well to the cyberattack, CEO
Michael Lynton said that he felt otherwise. He stated that his top priority was to make important
decisions quickly, saying, “You can’t be caught in the headlights doing nothing.” 36
Lynton
described the situation as difficult, with no playbook to follow.
Revenue at Stake as Theaters Cancel Film Showing
On December 15th
, the Guardians of Peace (#GOP) claimed responsibility for the Sony hack and
threatened major terrorist attacks on theaters showing the film. Theaters such as Regal
Entertainment Group, AMC Entertainment Holdings Inc., Cinemark Holdings Inc., and Carmike
Cinemas Inc., as a result, opted out of showing the movie, citing concerns for audience safety.37
The Department of Homeland Security said the #GOP’s threats lacked credibility. Due
to concerns over box office sales across the industry, theater operators encouraged Sony to delay
the opening. After Sony declined, the theaters announced they wouldn’t show The Interview
until the FBI completed its investigation.38
(Appendix E shows the effects of this decision on the
company’s stock price.) Shortly after this announcement, Sony Pictures decided to cancel its
planned release of The Interview, a last-minute decision unprecedented in the modern motion
picture industry. Entertainment industry sources estimated that damage to the studio and losses
incurred from shelving the release would top at least $100 million.39
As of Thursday, December
18th
, Sony had no plans to release the film in any capacity.40
Discussion Questions
1. How can Sony employ communication strategies to defend its public reputation and improve
employee morale?
2. What options are available to Sony to minimize revenue loss on The Interview?
3. Is Sony to blame for the cyberattack in the first place? Should the company take the blame?
4. If you were Sony Pictures CEO Michael Lynton, what actions, if any, would you have taken
when you first heard about the security breach?
Appendix A
6
7
Appendix B
8
Appendix C
9
Appendix D
Internal Memo
On the evening of December 2, 2014, sources reported that Sony CEO Michael Lynton and Co-
Chairman Amy Pascal at Sony sent an internal memo to 6,500 current employees that confirmed
that a “large amount of confidential Sony Pictures Entertainment data has been stolen by the
cyberattackers, including personnel information,” stated that “the privacy and security of our
employees are of real concern to us,” warned that “we are not yet sure of the full scope of
information that the attackers have or might release” and “unfortunately have to ask you to
assume that information about you in the possession of the company might be in their
possession,” and promised employees that they would receive an email on December 3, 2014
that outlined steps to sign up for identity protection services.
10
Appendix E
11
1
Cieply, M., & Barnes, B. (2014, December 30). “Sony Cyberattack, First a Nuisance, Swiftly Grew Into a
Firestorm.” The New York Times. Retrieved from <http://www.nytimes.com/2014/12/31/business/media/sony-
attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html>
2
Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from
<http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg>
3
Johnson, K., Dorell, O., & Weise, E. (2014, December 18). “Official: North Korea Behind Sony Hack.” USA
Today. Retrieved from <http://www.usatoday.com/story/news/world/2014/12/17/north-korea-sony-hack/20558135/>
4
Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from
<http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg>
5
“Company History.” (n.d.). Sony Corporation Global Headquarters. Retrieved from <http://www.sony.net/
SonyInfo/CorporateInfo/History/history.html>
6
“Company History.” (n.d.). Sony Pictures. Retrieved from <http://www.sonypictures.com/corp/history.html>
7
Inagaki, K. (2015, January 19). “Sony’s Backers Focus on Bigger Picture After Cyber Attack.” Financial Times.
Retrieved from <http://www.ft.com/cms/s/0/3af3b790-97f2-11e4-84d4-00144feabdc0.html#axzz3XoHwAEBe>
8
“Sony: Consolidated Financial Statements For the Fiscal Year Ending March 2014.” (n.d.). Retrieved from
<http://www.sony.net/SonyInfo/IR/financial/fr/FY13_Consolidated_Financial_Statement.pdf>
9
“Sony Pictures.” (n.d.). Movie Insider. Retrieved from <http://www.movieinsider.com/c8/sony-pictures/>
10
“Box Office by Studio: Studio Market Share.” (n.d.). Box Office Mojo. Retrieved from
<http://www.boxofficemojo.com/studio/?view=company&view2=yearly&yr=2014&p=.htm>
11
Harris, T. (n.d.). “How Digital Cinema Works.” HowStuffWorks. Retrieved from <http://entertainment.howstuff
works.com/digital-cinema.htm>
12
Stewart, A. (2013, October 23). “Digital Cinema Distribution Coalition Flips the Switch on Theatrical Satellite
Service.” Variety (Online). Retrieved from <http://variety.com/2013/digital/news/digital-cinema-distribution-
coalition-flips-the-switch-on-theatrical-satellite-service-1200755429/>
13
Acharya, A., Hamilton, M., Head, T., Hosu, J., Sarma, H., & Torres, D. (n.d.). “The Evolution of Digital Cinema:
Executive Summary.” The Tuck School of Dartmouth. Retrieved from <http://faculty.tuck.dartmouth.edu/
images/uploads/faculty/ron-adner/Digital_Cinema_Exec_SummaryFinal.pdf>
14
Stewart, A. (2013, April 17). “Filmmakers Lament Extinction of Film Prints.” Variety (Online). Retrieved from
<http://variety.com/2013/film/news/film-jobs-decline-as-digital-distribution-gains-foothold-1200375732/>
15
Kharpal, A. (2015, February 12). “Year of the Hack? A Billion Records Compromised in 2014.” CNBC (Online).
Retrieved from <http://www.cnbc.com/id/102420088#>
16
Bitium. (2015, February 10). “The Biggest Data Breaches and Hacks of 2014.” Recode. Retrieved from
<http://recode.net/2015/02/10/the-biggest-data-breaches-and-hacks-of-2014/>
17
Gilbert, D. (2014, December 19). “Hackers Take Control in 2014.” International Business Times (Online).
Retrieved from <http://www.ibtimes.co.uk/hackers-take-control-2014-sony-pictures-anonymous-hacktivism-
fappening-snappening-regin-1480274>
References
12
18
“Identity Theft: Evolving with Technology.” (n.d.) San Jose Police Department. Retrieved from
<https://www.sjpd.org/BFO/Community/Crimeprev/crimeprevention%20forms/Identitytheft.pdf>
19
Brustein, J. (2014, December 3). “Experts: Sony Hackers Were Inside The Company Network For A Long Time.”
Bloomberg (Online). Retrieved from <http://www.bloomberg.com/bw/articles/2014-12-03/sony-hackers-were-
inside-the-company-network-for-a-long-time>
20
“Class Action Complaint, Corona v. Sony Pictures Entertainment, Inc., CV09600.” (2014, December 15). Page
15. Retrieved from <http://www.aceds.org/wp-content/uploads/2014/12/Corona-and-Mathis-v.-Sony-Pictures-
Entertainment-12-15-14.pdf>
21
“Class Action Complaint, Corona v. Sony Pictures Entertainment, Inc., CV09600.” (2014, December 15). Page
2. Retrieved from <http://www.aceds.org/wp-content/uploads/2014/12/Corona-and-Mathis-v.-Sony-Pictures-
Entertainment-12-15-14.pdf>
22
Inagaki, K. (2015, January 19). “Sony’s Backers Focus on Bigger Picture After Cyberattack.” Financial Times
(Online). Retrieved from <http://www.ft.com/intl/cms/s/0/3af3b790-97f2-11e4-84d4-00144feabdc0.html#
axzz3Y444OMrD>
23
Reyes, M. (2014, December 23). “The Staggering Amount of Money Sony Could Lose On the Interview.” Cinema
Blend. Retrieved from <http://www.cinemablend.com/new/Staggering-Amount-Money-Sony-Could-Lose-Interview-
68751.html#comment-1750448701>
24
Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from
<http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg>
25
Fritz, B., Yadron, D., & Schwartzel, E. (2014, December 30). “Behind the Scenes at Sony as Hacking Crisis
Unfolded.” The Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/behind-the-scenes-at-
sony-as-hacking-crisis-unfolded-1419985719>
26
Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from
<http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg>
27
Internet Movie Database. (n.d.). “The Interview.” Retrieved from
<http://www.imdb.com/title/tt2788710/?ref_=nv_sr_1>
28
U.S. Department of State. (n.d.) “Democratic People’s Republic of Korea: 2013 Human Right Report.” Retrieved
from <http://www.state.gov/j/drl/rls/hrrpt/humanrightsreport/index.htm?year=2013&dlid=220202#wrapper>
29
Fritz, B., Schwartzel, E., & Devlin, B. (2014, December 18). “Sony Pulls Korea Film 'The Interview;' U.S. Blames
Pyongyang for Hack.” Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/sony-cancels-
release-of-the-interview-us-blames-pyongyang-for-hack-1418844906>
30
Kwaak, J. S. (2014, December 18). “Sony Hack Shines Light on North Korea's Cyber Attackers.” Wall Street
Journal (Online). Retrieved from <http://www.wsj.com/articles/sony-hack-shines-light-on-north-koreas-cyber-
attackers-1418877740>
31
Foweler, S. (2014, December 17). “Why North Korea Fears The Interview.” BBC (Online). Retrieved from
<http://www.bbc.com/culture/story/20141217-why-north-korea-fears-this-film>
32
Curran, J. (2015, January 12). “White House Sets Sanctions on North Korea for Sony Hack.” Cybersecurity Policy
Report. Retrieved from <http://search.proquest.com/docview/1648337932?accountid=12874>
13
33
Inagaki, K. (2015, January 19). “Sony’s Backers Focus on Bigger Picture After Cyber Attack. Financial Times
(Online). Retrieved from <http://www.ft.com/intl/cms/s/0/3af3b790-97f2-11e4-84d4-00144feabdc0.html?
siteedition=intl#axzz3RNT92iUr>
34
Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from
<http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg>
35
“Class Action Complaint, Corona v. Sony Pictures Entertainment, Inc., CV09600.” (2014, December 15). Page 9.
Retrieved from <http://www.aceds.org/wp-content/uploads/2014/12/Corona-and-Mathis-v.-Sony-Pictures-
Entertainment-12-15-14.pdf>
36
Fritz, B., Yadron, D., & Schwartzel, E. (2014, December 30). “Behind the Scenes at Sony as Hacking Crisis
Unfolded.” Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/behind-the-scenes-at-sony-
as-hacking-crisis-unfolded-1419985719>
37
Fritz, B., Schwartzel, E., & Devlin, B. (2014, December 18). “Sony Pulls Korea Film 'The Interview;' U.S. Blames
Pyongyang for Hack.” The Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/sony-cancels-
release-of-the-interview-us-blames-pyongyang-for-hack-1418844906>
38
Ibid.
39
Richwine, L. (2014, December 9). “Cyber Attack Could Cost Sony Studio as Much as $100 million.” Reuters.
Retrieved from <http://www.reuters.com/article/2014/12/09/sony-cybersecurity-costs-idUSL1N0TT1YO20141209>
40
Alexander, B.; Mandell, A.; Weise, E. (2014), December 18). “No ‘Interview’ . . . on any platform.” USA Today.
<http://www.usatoday.com/story/tech/2014/12/17/sony-hack-the-interview/20519545/>
14

More Related Content

What's hot

A CASE STUDY ON SONY CORPORATION
A CASE STUDY ON SONY CORPORATIONA CASE STUDY ON SONY CORPORATION
A CASE STUDY ON SONY CORPORATION
Nirav Desai
 
Sony case study
Sony case studySony case study
Sony case studyTariq1989
 
Sony Corporation
Sony CorporationSony Corporation
Sony Corporation
Fernando Gutiérrez
 
Reality tv ch 7 pres.
Reality tv ch 7 pres.Reality tv ch 7 pres.
Reality tv ch 7 pres.kovajess
 
Presentation1 shorter
Presentation1 shorterPresentation1 shorter
Presentation1 shortereriimarie89
 
Sony International Management
Sony International ManagementSony International Management
Sony International Management
Joost Narraina
 
Sony new group
Sony new    groupSony new    group
Sony new groupSM3027
 
Sony
SonySony
Sony presentation
Sony presentationSony presentation
Sony presentation
Leha P
 
Spidrmanisamazing
SpidrmanisamazingSpidrmanisamazing
Spidrmanisamazing
robynisnotginger
 
Everything about Sony Corp.
Everything about Sony Corp.Everything about Sony Corp.
Everything about Sony Corp.
Maneesh Garg
 
Presentation on SONY
Presentation on SONYPresentation on SONY
Company Review on Sony
Company Review on Sony Company Review on Sony
Company Review on Sony
PS NEEMISH
 
Sony Brand Image Measurement
Sony Brand Image MeasurementSony Brand Image Measurement
Sony Brand Image MeasurementNahid Anjum
 
Sony Ericsson (Business Strategy)
Sony Ericsson (Business Strategy)Sony Ericsson (Business Strategy)
Sony Ericsson (Business Strategy)
Shabbir Akhtar
 

What's hot (20)

A CASE STUDY ON SONY CORPORATION
A CASE STUDY ON SONY CORPORATIONA CASE STUDY ON SONY CORPORATION
A CASE STUDY ON SONY CORPORATION
 
Sony case study
Sony case studySony case study
Sony case study
 
HBO-Finanlize
HBO-FinanlizeHBO-Finanlize
HBO-Finanlize
 
Sony Corporation
Sony CorporationSony Corporation
Sony Corporation
 
HBO
HBOHBO
HBO
 
Reality tv ch 7 pres.
Reality tv ch 7 pres.Reality tv ch 7 pres.
Reality tv ch 7 pres.
 
Presentation1 shorter
Presentation1 shorterPresentation1 shorter
Presentation1 shorter
 
MK 221 - HBO (1)
MK 221 - HBO (1)MK 221 - HBO (1)
MK 221 - HBO (1)
 
Sony International Management
Sony International ManagementSony International Management
Sony International Management
 
Sony new group
Sony new    groupSony new    group
Sony new group
 
Sony
SonySony
Sony
 
Sony
SonySony
Sony
 
Sony presentation
Sony presentationSony presentation
Sony presentation
 
HBO Voyeur
HBO VoyeurHBO Voyeur
HBO Voyeur
 
Spidrmanisamazing
SpidrmanisamazingSpidrmanisamazing
Spidrmanisamazing
 
Everything about Sony Corp.
Everything about Sony Corp.Everything about Sony Corp.
Everything about Sony Corp.
 
Presentation on SONY
Presentation on SONYPresentation on SONY
Presentation on SONY
 
Company Review on Sony
Company Review on Sony Company Review on Sony
Company Review on Sony
 
Sony Brand Image Measurement
Sony Brand Image MeasurementSony Brand Image Measurement
Sony Brand Image Measurement
 
Sony Ericsson (Business Strategy)
Sony Ericsson (Business Strategy)Sony Ericsson (Business Strategy)
Sony Ericsson (Business Strategy)
 

Viewers also liked

Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
International Institute for Learning
 
(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...
(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...
(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...
Amazon Web Services
 
The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...
The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...
The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...
Maor Gillerman
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army
blackflags
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].
Alexander Decker
 
Blog Example
Blog ExampleBlog Example
Blog Example
Dylan Holbrook
 
Is Recycling Good Stewardship or Bad Business?
Is Recycling Good Stewardship or Bad Business?Is Recycling Good Stewardship or Bad Business?
Is Recycling Good Stewardship or Bad Business?
Dylan Holbrook
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Cyphort
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
Nick Bilogorskiy
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
Dylan Holbrook
 
Successful Outsourcing Transitions Webinar Presentation
Successful Outsourcing Transitions Webinar PresentationSuccessful Outsourcing Transitions Webinar Presentation
Successful Outsourcing Transitions Webinar Presentation
Neo Group Inc
 
Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack Presentation
CreditCardFinder
 
Workforce Analysis Presentation
Workforce Analysis PresentationWorkforce Analysis Presentation
Workforce Analysis PresentationJulie Lee
 
Anonymous sources and privacy
Anonymous sources and privacyAnonymous sources and privacy
Anonymous sources and privacy
Dan Kennedy
 

Viewers also liked (14)

Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...
(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...
(ISM202) Sony Pictures' Rapid Recovery Solution for Disaster Recovery and Bus...
 
The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...
The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...
The Interview screenplay by Dan Sterling (for educational purposes) ראיון סוף...
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].
 
Blog Example
Blog ExampleBlog Example
Blog Example
 
Is Recycling Good Stewardship or Bad Business?
Is Recycling Good Stewardship or Bad Business?Is Recycling Good Stewardship or Bad Business?
Is Recycling Good Stewardship or Bad Business?
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Successful Outsourcing Transitions Webinar Presentation
Successful Outsourcing Transitions Webinar PresentationSuccessful Outsourcing Transitions Webinar Presentation
Successful Outsourcing Transitions Webinar Presentation
 
Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack Presentation
 
Workforce Analysis Presentation
Workforce Analysis PresentationWorkforce Analysis Presentation
Workforce Analysis Presentation
 
Anonymous sources and privacy
Anonymous sources and privacyAnonymous sources and privacy
Anonymous sources and privacy
 

Similar to Sony Pictures Entertainment Case A

On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
aabdin101
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
accuraprintengineers
 
The Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdfThe Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdf
abyssiniaimpex1
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
joshua2345678
 
Cross-Media Business Models: Financing Beyond the Big Screen - Peter Cowley
Cross-Media Business Models: Financing Beyond the Big Screen - Peter CowleyCross-Media Business Models: Financing Beyond the Big Screen - Peter Cowley
Cross-Media Business Models: Financing Beyond the Big Screen - Peter Cowley
power to the pixel
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
Kirti Ahirrao
 
Sony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs alaSony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs ala
vaibhav tailor
 
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 (Sony) Risk assignment final high profile security breach of Sony’s Playstat... (Sony) Risk assignment final high profile security breach of Sony’s Playstat...
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
James Dellinger
 
Howard environmental analysis
Howard environmental analysisHoward environmental analysis
Howard environmental analysis
lydia163540
 
Howard environmental analysis
Howard environmental analysisHoward environmental analysis
Howard environmental analysis
HaroldHoward2
 
Sony Playstation 3
Sony Playstation 3Sony Playstation 3
Sony Playstation 3
April Dillard
 
Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600Raman Kumar Jha
 
Marketing Analysis Report For Sony Pictures Entertainment
Marketing Analysis Report For Sony Pictures Entertainment Marketing Analysis Report For Sony Pictures Entertainment
Marketing Analysis Report For Sony Pictures Entertainment
HollyFaust1
 
Business Strategic management relating to law
Business Strategic management relating to lawBusiness Strategic management relating to law
Business Strategic management relating to law
Bhavna Nirban
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital PiracyErick Prajogo
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
anupamele
 
John Landry Sony RFP Final
John Landry Sony RFP FinalJohn Landry Sony RFP Final
John Landry Sony RFP FinalJohn Landry
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
Kapil Khandelwal (KK)
 
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
amcointernationaljam
 

Similar to Sony Pictures Entertainment Case A (20)

On November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdfOn November 24 2014 Sony Pictures Entertainment found out .pdf
On November 24 2014 Sony Pictures Entertainment found out .pdf
 
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdfCase Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
Case Study 2 On November 24 2014 Sony Pictures Entertainme.pdf
 
The Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdfThe Tech section in Forbes magazine reported that the crimi.pdf
The Tech section in Forbes magazine reported that the crimi.pdf
 
The Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docxThe Sony Pictures Entertainment Hack The Problem On .docx
The Sony Pictures Entertainment Hack The Problem On .docx
 
Cross-Media Business Models: Financing Beyond the Big Screen - Peter Cowley
Cross-Media Business Models: Financing Beyond the Big Screen - Peter CowleyCross-Media Business Models: Financing Beyond the Big Screen - Peter Cowley
Cross-Media Business Models: Financing Beyond the Big Screen - Peter Cowley
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Sony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs alaSony pictures crippled by gop hackers, 2014 cs ala
Sony pictures crippled by gop hackers, 2014 cs ala
 
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 (Sony) Risk assignment final high profile security breach of Sony’s Playstat... (Sony) Risk assignment final high profile security breach of Sony’s Playstat...
(Sony) Risk assignment final high profile security breach of Sony’s Playstat...
 
Howard environmental analysis
Howard environmental analysisHoward environmental analysis
Howard environmental analysis
 
Howard environmental analysis
Howard environmental analysisHoward environmental analysis
Howard environmental analysis
 
Sony Playstation 3
Sony Playstation 3Sony Playstation 3
Sony Playstation 3
 
Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600Raman sony corporation-mob-9782900600
Raman sony corporation-mob-9782900600
 
Marketing Analysis Report For Sony Pictures Entertainment
Marketing Analysis Report For Sony Pictures Entertainment Marketing Analysis Report For Sony Pictures Entertainment
Marketing Analysis Report For Sony Pictures Entertainment
 
Business Strategic management relating to law
Business Strategic management relating to lawBusiness Strategic management relating to law
Business Strategic management relating to law
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
a. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdfa. Disclosure  secret information known.Recent security incident .pdf
a. Disclosure  secret information known.Recent security incident .pdf
 
John Landry Sony RFP Final
John Landry Sony RFP FinalJohn Landry Sony RFP Final
John Landry Sony RFP Final
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
iPads a Distant Reality In Indian Healthcare : Kapil Khandelwal, www.kapilkha...
 
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
On April 19, 2011, system administrators at Sonys On April 22, Sony .pdf
 

Sony Pictures Entertainment Case A

  • 1. Sony Pictures Entertainment, Inc.: A Cybersecurity Attack from North Korea (A) Cyberattack November 24, 2014 began like most other days for Michael Lynton, Chief Executive Officer of Sony Pictures Entertainment. Upon arriving at the office, Lynton received a call from CFO David Hendler informing Lynton that Sony’s cybersecurity had been compromised. Employees started their computers that morning only to find disturbing images of Lynton’s severed head appear on their screens. Shortly after, Sony shut down all computer systems worldwide, issuing the following statement: “We are investigating an I.T. matter.” 1 The next day, four of the studio’s unreleased movies were posted on pirate Web sites. The hackers also claimed to have stolen approximately 100 terabytes of internal data, including personal and confidential information from thousands of Sony Pictures employees.2 Lynton and Sony executives could not have predicted that in three short weeks, the digital attack would be at the center of a global controversy. In total, eight leaks released an estimated 38 million files and thousands of personal, damaging e-mails belonging to Sony Pictures executives.3 According to investigators, the magnitude of the data published was simply unprecedented in U.S. corporate history. Sony Pictures soon found its brand identity under scrutiny, making headlines in all major news sources. Rich Klein, partner at McLarty Associates advisory firm, called the event “an international crisis, the cyberattack that put Americans’ vulnerability on display, a free speech cause, an Oval Office gut-check, and a cautionary tale for the future of warfare.” 4 Entering the Motion Picture Entertainment Business Sony Pictures is a United States based subsidiary of Sony Corporation. Sony Corporation was established in 1946 and based in Tokyo, Japan.5 In 1960, Sony Corporation of America was established in the United States and was listed on the New York Stock Exchange in 1970. Late in the Twentieth Century, Sony had become one of the world’s leading consumer electronics manufacturers. In 1991, Sony acquired Columbia Pictures Entertainment and renamed it Sony Pictures Entertainment, Inc., (SPE). In 2004, Michael Lynton joined SPE as Chairman and Chief Executive Officer. That same year, Amy Pascal was promoted to Chairman of the Motion Picture Group, and to Co-Chairman of SPE two years later. In 2006, SPE crossed the $1 billion mark in domestic box-office receipts for the fifth year in a row.6
  • 2. Sony pledged to operate SPE as independently as possible. The motion picture business represents 10% of revenue for the parent corporation. Although SPE provides just a small fraction of the company’s total income, the motion picture business bears Sony’s name, which carries major implications for the Sony brand. Size and Scope of Sony Motion Picture Entertainment The entertainment division is one of the most profitable sectors of the company. Sony Motion Pictures has retained profits between 4% and 7% in recent years, while the electronics divisions have operated consistently in the red.7 In the fiscal year ending March 31, 2014, Sony Pictures reported $8 billion in revenue.8 (See Appendix A). Sony is a major player in the motion picture industry with 199 completed movies.9 Sony Motion Pictures Entertainment retains an estimated 12.2% of market share, which can be compared to 20th Century Fox (17.3%), Buena Vista (15.6%), and Warner Bros (15.1%). In sum, these four enterprises account for approximately 60% of the total market. Universal and Paramount – other well-known players – both lag behind Sony with respect to market share.10 (See Appendix B for additional industry information.) Technology Revolutionizes the Filmmaking Business New video technology has revolutionized the way movies are made. Historically, 35mm film was the standard for producing, distributing, and displaying motion pictures. This required the physical film to be copied and distributed to theaters. In 2002, Star Wars: Episode II led the charge as the first movie shot entirely on digital video.11 This helped inspire an entire digital generation of producers and editors, offering cost savings in both time and money and flexibility and simplicity in post-production edits. Digital movies are essentially very large computer files that theaters are able to play on as many movie screens as they desire. In years past, a theater was dependent on the number of film reels that could be manually delivered to them. Now, via satellite delivery, theaters have much greater flexibility, which affords the capability to match screen decisions to consumer demand. In 2013, the Digital Cinema Distribution Coalition provided digital distribution technologies to more than 1,200 theaters and 17,000 screens.12 While digital movie distribution has major benefits, it does not come without its drawbacks and risks. Enhanced security protocols, such as encryption techniques, are necessary to help prevent piracy. Distribution, a critical component of the movie industry, has also changed as a result, requiring theaters to invest in new digital projection equipment. This investment represents a large capital expenditure for theaters, costing as much as $70,000 per screen for a digital cinema retrofit.13,14 Fortunately, studios and distributors have helped theaters offset such costs due to the importance of digital distribution. Sony Pictures, for example, relies on exhibitors to generate box office sales. The risk is assumed by exhibitors who choose to turn screens over to Sony and rely on Sony to drive consumer demand and produce box office hits. 2
  • 3. 2014: The Year of Cybersecurity Attacks The digital age has led to a new era of crime and theft of corporate assets. Companies now store important data such as corporate assets, company records, and customer information digitally. This lends itself to the possibility that hackers could retrieve this valuable information if proper security standards are not set and followed. The year 2014 was popular for corporate data theft. Target, Snapchat, Forbes, Michael’s, eBay, Home Depot, and USPS all suffered major data breaches. CNBC has estimated that over one billion personal data records were compromised that year as a result of approximately 1,500 incidents. This is a 78% increase from 2013.15 Hackers were able to retrieve everything from users’ e-mail messages, passwords, and credit card information, to employee data and phone numbers.16 The cyberattacks were designed to access customers’ financial accounts, as well as sensitive information that might allow identity theft. The Target hack, for example, resulted in the online auction of 2 million credit cards, allowing hackers to steal some $53 million.17 Trends in data hacking reveal that cybercriminals are shifting focus from short-term credit card theft to long-term identity theft, which helps to create sustainable revenue streams.18 Sony’s Data Protection Controls Security experts examining Sony’s malware discovered that the hackers were familiar with Sony’s network long before the breach occurred. Evidence suggests that the attackers gained control of Sony’s private cryptographic keys, which secured encrypted information. Control of these keys allowed suspicious movements of data to go undetected. Historically, Sony has been a popular target for hackers. In 2011, account information of 77 million Sony Playstation users was stolen.19 It was reported that Sony was threatened in advance of this breach and failed to implement adequate safeguards to protect it,20 even though it is a company’s responsibility to change their keys frequently, especially after notification of vulnerabilities. A class-action complaint was filed against Sony in response to the 2014 cyberattack. The complaint alleges that, “Sony failed to secure its computer systems, servers, and databases (‘Network’), despite weaknesses that it has known about for years . . . .” and, “Sony subsequently failed to timely protect confidential information of its current and former employees from law-breaking hackers . . . .” 21 The Interview: A Comedy SPE was in the final preparations for launching The Interview to theaters nationwide when the cyberattack occurred. The movie, a fictional comedic film depicting the attempted assassination of North Korean leader Kim Jong-un, starred Seth Rogen and James Franco. It was directed by Evan Goldberg and Seth Rogen. Sony invested $44 million in production, and the movie was 3
  • 4. projected to bring in $90 million in revenue, based on a strong record of comedies starring Seth Rogen.22 Sony embarked on a major marketing campaign prior to the movie’s winter premiere. Advertising costs were estimated to reach nearly $30 million.23 Sony Corporation CEO Kazuo Hirai voiced concerns soon after learning about the film’s plot because of Japan and North Korea’s tense bilateral relationship. Hirai sent formal demands to Pascal and the team to change parts of the film after receiving warnings from North Korean news agencies in June of 2014.24 Sony executives worked with government think tanks to talk about possible political consequences. The company made some changes, such as using “Columbia Pictures” instead of the Japanese Sony brand. Direct retribution from North Korea was simply not envisioned as a credible threat.25 Various entertainment media reported that studio executives questioned whether The Interview should refer to the real North Korean regime or, perhaps, a fictitious dictator.26 After consulting with several experts, Lynton was told the film was safe to release. The movie was set to premiere on Christmas Day, December 25, 2014, at all major cinemas across the United States. The launch plan included premieres in 10 other countries within the following eight weeks.27 (See Appendix C for the movie poster.) North Korea’s Involvement The Democratic People’s Republic of Korea is a rigidly authoritarian state that has been led by the Kim family for more than 60 years.28 North Korea maintains strict government controls over its citizens, including many that are thought to violate basic human rights. Draconian laws involving severe punishment enforce citizen loyalty to the North Korean regime. Although North Korea limits access to the Internet, the nation maintains a robust corps of computer hackers.29 The North Korean regime chooses some of its best talent for cyberwarfare training and allocates substantial resources to maintain and develop the program. “Cyberwarrior,” in fact, is a highly coveted government position.30 North Korea’s reaction to The Interview reflects the unusually strict ideology of the country. The movie parodied the country’s leader and his imagined assassination. The depiction of Kim Jong-un and his dynasty as fallible – an impossible and frightening image to the regime – likely helped to inspire calls for retribution.31 Credible, material evidence gathered following the data breach indicates that the hackers engineered the attack to damage Sony’s computer systems and to humiliate the company, thereby proving their loyalty to Kim Jong-un. This objective differs from the majority of corporate hacks, which focus on financial gain. On December 19th , the United States government was able to confirm that the hack originated in North Korea. Investigators found significant overlap between the digital fingerprints of the Sony attack to other North Korean cyberattacks on South Korean banks. The U.S. stated that it viewed the event as a “serious national security matter.” 32 4
  • 5. The Aftermath of the Cyberattack In the immediate aftermath of the cyberattack, Sony’s communication system was shut down. Senior executives quickly implemented alternative communication networks at the company, leveraging phone trees, notepads, and outdated cell phones. The compromised system at Sony Pictures took weeks to restore. The hackers not only stole Sony’s data, but had completely erased it. The attackers threatened to leak Sony movies as well as thousands of internal documents and the personal information of more than 47,000 people, including employees, freelancers, and movie stars. They did not identify themselves or issue specific demands. Although it was suspected that the hack was perpetrated by North Korean cybercriminals, officials of the DPRK denied all allegations. This made it difficult to communicate details surrounding the attack to employees and external parties. The crisis-management team at Sony Pictures set up desks to help employees with credit protection and fraud alerts. The team also set up new e-mail accounts and telephone numbers. They were doing what they could to shift all digital systems back to traditional pen-and-paper methods; however, it seemed to be too late. The hackers already had accessed all the data they needed to irrevocably damage Sony’s reputation. Leadership Sony Corporation CEO Kazuo Hirai played a negligible media role during the attack, preferring to place his confidence in Lynton and Pascal. However, Hirai claimed he signed off on all external communication and decisions made with regards to the cyberattack.33 CEO Michael Lynton, reserved and analytical, was forced to jump into the spotlight, shadowing Motion Picture Chief, Amy Pascal, who had long been the “face of Sony Pictures.” Pascal’s credibility had deteriorated after several of her e-mails surfaced on December 8th and 10th , which included celebrity insults and racist comments involving President Obama. 34 Sony leadership promised employees that they would receive an e-mail outlining steps to sign up for identity protection services. Two days after the promised e-mail, 47,426 unique social security numbers and other personal information of more than 15,000 current and former Sony employees were leaked.35 (Appendix D outlines details of this memo.) Sony took a gamble when deciding how to respond to the cyberattack. Several employees would later allege that Sony knew about the risks to its digital storage and the geopolitical sensitivity of The Interview but chose to make decisions that were not in the best interest of Sony employees. 5
  • 6. In response to the allegations that Sony did not react well to the cyberattack, CEO Michael Lynton said that he felt otherwise. He stated that his top priority was to make important decisions quickly, saying, “You can’t be caught in the headlights doing nothing.” 36 Lynton described the situation as difficult, with no playbook to follow. Revenue at Stake as Theaters Cancel Film Showing On December 15th , the Guardians of Peace (#GOP) claimed responsibility for the Sony hack and threatened major terrorist attacks on theaters showing the film. Theaters such as Regal Entertainment Group, AMC Entertainment Holdings Inc., Cinemark Holdings Inc., and Carmike Cinemas Inc., as a result, opted out of showing the movie, citing concerns for audience safety.37 The Department of Homeland Security said the #GOP’s threats lacked credibility. Due to concerns over box office sales across the industry, theater operators encouraged Sony to delay the opening. After Sony declined, the theaters announced they wouldn’t show The Interview until the FBI completed its investigation.38 (Appendix E shows the effects of this decision on the company’s stock price.) Shortly after this announcement, Sony Pictures decided to cancel its planned release of The Interview, a last-minute decision unprecedented in the modern motion picture industry. Entertainment industry sources estimated that damage to the studio and losses incurred from shelving the release would top at least $100 million.39 As of Thursday, December 18th , Sony had no plans to release the film in any capacity.40 Discussion Questions 1. How can Sony employ communication strategies to defend its public reputation and improve employee morale? 2. What options are available to Sony to minimize revenue loss on The Interview? 3. Is Sony to blame for the cyberattack in the first place? Should the company take the blame? 4. If you were Sony Pictures CEO Michael Lynton, what actions, if any, would you have taken when you first heard about the security breach? Appendix A 6
  • 7. 7
  • 10. Appendix D Internal Memo On the evening of December 2, 2014, sources reported that Sony CEO Michael Lynton and Co- Chairman Amy Pascal at Sony sent an internal memo to 6,500 current employees that confirmed that a “large amount of confidential Sony Pictures Entertainment data has been stolen by the cyberattackers, including personnel information,” stated that “the privacy and security of our employees are of real concern to us,” warned that “we are not yet sure of the full scope of information that the attackers have or might release” and “unfortunately have to ask you to assume that information about you in the possession of the company might be in their possession,” and promised employees that they would receive an email on December 3, 2014 that outlined steps to sign up for identity protection services. 10
  • 12. 1 Cieply, M., & Barnes, B. (2014, December 30). “Sony Cyberattack, First a Nuisance, Swiftly Grew Into a Firestorm.” The New York Times. Retrieved from <http://www.nytimes.com/2014/12/31/business/media/sony- attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html> 2 Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from <http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg> 3 Johnson, K., Dorell, O., & Weise, E. (2014, December 18). “Official: North Korea Behind Sony Hack.” USA Today. Retrieved from <http://www.usatoday.com/story/news/world/2014/12/17/north-korea-sony-hack/20558135/> 4 Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from <http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg> 5 “Company History.” (n.d.). Sony Corporation Global Headquarters. Retrieved from <http://www.sony.net/ SonyInfo/CorporateInfo/History/history.html> 6 “Company History.” (n.d.). Sony Pictures. Retrieved from <http://www.sonypictures.com/corp/history.html> 7 Inagaki, K. (2015, January 19). “Sony’s Backers Focus on Bigger Picture After Cyber Attack.” Financial Times. Retrieved from <http://www.ft.com/cms/s/0/3af3b790-97f2-11e4-84d4-00144feabdc0.html#axzz3XoHwAEBe> 8 “Sony: Consolidated Financial Statements For the Fiscal Year Ending March 2014.” (n.d.). Retrieved from <http://www.sony.net/SonyInfo/IR/financial/fr/FY13_Consolidated_Financial_Statement.pdf> 9 “Sony Pictures.” (n.d.). Movie Insider. Retrieved from <http://www.movieinsider.com/c8/sony-pictures/> 10 “Box Office by Studio: Studio Market Share.” (n.d.). Box Office Mojo. Retrieved from <http://www.boxofficemojo.com/studio/?view=company&view2=yearly&yr=2014&p=.htm> 11 Harris, T. (n.d.). “How Digital Cinema Works.” HowStuffWorks. Retrieved from <http://entertainment.howstuff works.com/digital-cinema.htm> 12 Stewart, A. (2013, October 23). “Digital Cinema Distribution Coalition Flips the Switch on Theatrical Satellite Service.” Variety (Online). Retrieved from <http://variety.com/2013/digital/news/digital-cinema-distribution- coalition-flips-the-switch-on-theatrical-satellite-service-1200755429/> 13 Acharya, A., Hamilton, M., Head, T., Hosu, J., Sarma, H., & Torres, D. (n.d.). “The Evolution of Digital Cinema: Executive Summary.” The Tuck School of Dartmouth. Retrieved from <http://faculty.tuck.dartmouth.edu/ images/uploads/faculty/ron-adner/Digital_Cinema_Exec_SummaryFinal.pdf> 14 Stewart, A. (2013, April 17). “Filmmakers Lament Extinction of Film Prints.” Variety (Online). Retrieved from <http://variety.com/2013/film/news/film-jobs-decline-as-digital-distribution-gains-foothold-1200375732/> 15 Kharpal, A. (2015, February 12). “Year of the Hack? A Billion Records Compromised in 2014.” CNBC (Online). Retrieved from <http://www.cnbc.com/id/102420088#> 16 Bitium. (2015, February 10). “The Biggest Data Breaches and Hacks of 2014.” Recode. Retrieved from <http://recode.net/2015/02/10/the-biggest-data-breaches-and-hacks-of-2014/> 17 Gilbert, D. (2014, December 19). “Hackers Take Control in 2014.” International Business Times (Online). Retrieved from <http://www.ibtimes.co.uk/hackers-take-control-2014-sony-pictures-anonymous-hacktivism- fappening-snappening-regin-1480274> References 12
  • 13. 18 “Identity Theft: Evolving with Technology.” (n.d.) San Jose Police Department. Retrieved from <https://www.sjpd.org/BFO/Community/Crimeprev/crimeprevention%20forms/Identitytheft.pdf> 19 Brustein, J. (2014, December 3). “Experts: Sony Hackers Were Inside The Company Network For A Long Time.” Bloomberg (Online). Retrieved from <http://www.bloomberg.com/bw/articles/2014-12-03/sony-hackers-were- inside-the-company-network-for-a-long-time> 20 “Class Action Complaint, Corona v. Sony Pictures Entertainment, Inc., CV09600.” (2014, December 15). Page 15. Retrieved from <http://www.aceds.org/wp-content/uploads/2014/12/Corona-and-Mathis-v.-Sony-Pictures- Entertainment-12-15-14.pdf> 21 “Class Action Complaint, Corona v. Sony Pictures Entertainment, Inc., CV09600.” (2014, December 15). Page 2. Retrieved from <http://www.aceds.org/wp-content/uploads/2014/12/Corona-and-Mathis-v.-Sony-Pictures- Entertainment-12-15-14.pdf> 22 Inagaki, K. (2015, January 19). “Sony’s Backers Focus on Bigger Picture After Cyberattack.” Financial Times (Online). Retrieved from <http://www.ft.com/intl/cms/s/0/3af3b790-97f2-11e4-84d4-00144feabdc0.html# axzz3Y444OMrD> 23 Reyes, M. (2014, December 23). “The Staggering Amount of Money Sony Could Lose On the Interview.” Cinema Blend. Retrieved from <http://www.cinemablend.com/new/Staggering-Amount-Money-Sony-Could-Lose-Interview- 68751.html#comment-1750448701> 24 Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from <http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg> 25 Fritz, B., Yadron, D., & Schwartzel, E. (2014, December 30). “Behind the Scenes at Sony as Hacking Crisis Unfolded.” The Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/behind-the-scenes-at- sony-as-hacking-crisis-unfolded-1419985719> 26 Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from <http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg> 27 Internet Movie Database. (n.d.). “The Interview.” Retrieved from <http://www.imdb.com/title/tt2788710/?ref_=nv_sr_1> 28 U.S. Department of State. (n.d.) “Democratic People’s Republic of Korea: 2013 Human Right Report.” Retrieved from <http://www.state.gov/j/drl/rls/hrrpt/humanrightsreport/index.htm?year=2013&dlid=220202#wrapper> 29 Fritz, B., Schwartzel, E., & Devlin, B. (2014, December 18). “Sony Pulls Korea Film 'The Interview;' U.S. Blames Pyongyang for Hack.” Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/sony-cancels- release-of-the-interview-us-blames-pyongyang-for-hack-1418844906> 30 Kwaak, J. S. (2014, December 18). “Sony Hack Shines Light on North Korea's Cyber Attackers.” Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/sony-hack-shines-light-on-north-koreas-cyber- attackers-1418877740> 31 Foweler, S. (2014, December 17). “Why North Korea Fears The Interview.” BBC (Online). Retrieved from <http://www.bbc.com/culture/story/20141217-why-north-korea-fears-this-film> 32 Curran, J. (2015, January 12). “White House Sets Sanctions on North Korea for Sony Hack.” Cybersecurity Policy Report. Retrieved from <http://search.proquest.com/docview/1648337932?accountid=12874> 13
  • 14. 33 Inagaki, K. (2015, January 19). “Sony’s Backers Focus on Bigger Picture After Cyber Attack. Financial Times (Online). Retrieved from <http://www.ft.com/intl/cms/s/0/3af3b790-97f2-11e4-84d4-00144feabdc0.html? siteedition=intl#axzz3RNT92iUr> 34 Seal, M. (2015, March). “An Exclusive Look at Sony’s Hacking Saga.” Vanity Fair (Online). Retrieved from <http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg> 35 “Class Action Complaint, Corona v. Sony Pictures Entertainment, Inc., CV09600.” (2014, December 15). Page 9. Retrieved from <http://www.aceds.org/wp-content/uploads/2014/12/Corona-and-Mathis-v.-Sony-Pictures- Entertainment-12-15-14.pdf> 36 Fritz, B., Yadron, D., & Schwartzel, E. (2014, December 30). “Behind the Scenes at Sony as Hacking Crisis Unfolded.” Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/behind-the-scenes-at-sony- as-hacking-crisis-unfolded-1419985719> 37 Fritz, B., Schwartzel, E., & Devlin, B. (2014, December 18). “Sony Pulls Korea Film 'The Interview;' U.S. Blames Pyongyang for Hack.” The Wall Street Journal (Online). Retrieved from <http://www.wsj.com/articles/sony-cancels- release-of-the-interview-us-blames-pyongyang-for-hack-1418844906> 38 Ibid. 39 Richwine, L. (2014, December 9). “Cyber Attack Could Cost Sony Studio as Much as $100 million.” Reuters. Retrieved from <http://www.reuters.com/article/2014/12/09/sony-cybersecurity-costs-idUSL1N0TT1YO20141209> 40 Alexander, B.; Mandell, A.; Weise, E. (2014), December 18). “No ‘Interview’ . . . on any platform.” USA Today. <http://www.usatoday.com/story/tech/2014/12/17/sony-hack-the-interview/20519545/> 14