May 14 - 27, 2018
www.charlestonbusiness.com 21
SPONSORED BY SC CYBER
Thought Leaders in Cybersecurity A Roundtable Discussion With so much of our lives, both professional and private, now connected to the internet, the concern over security grows daily. In this special section, thought leaders in cybersecurity provide insights into the issues and the steps you can take to protect your data and devices.
David Furr
Paul Ihme
Richard J. Krenmayer
Valerie Sessions
Cyber Attorney Gray, Layton, Kersh, Solomon, Furr and Smith PA
President of Consulting Services Soteria LLC
CEO Stasmayer Inc.
Professor and Chair Computer Science Department Charleston Southern University Computer Scientist SPAWAR, Atlantic
What emerging threats do you believe will impact your clients soon and how are you advising them? DAVID FURR/GRAY, LAYTON, KERSH: Our practice deals mainly with the small and medium businesses (SMB). (US Chamber defines SMB as revenues less than $1.2B or 1,000 employees.) Cybersecurity is nothing more than a critical subset of enterprise risk management. SMBs have a 70% chance of being hacked and even more importantly, 60% go out of business within 18 months of a hack. These are astonishing figures!
Just like the large enterprises, SMBs are fighting day-to-day in a competitive business world to provide their services or products profitably. They do not have the manpower or the technological wherewithal to cope with the cyber threats that face them on a daily basis. Unfortunately, security by obscurity is not a viable solution. These threats are not just from the shadowing figures abroad. We are seeing the emergence of domestic hacking as a competitive means. As varied as financial hacks to the intellectual property hacks to even litigation strategy hacks – ALL are appearing on the horizon of business interference threats.
RICHARD KRENMAYER, STASMAYER INC.: I believe a more sophisticated type of ransomware is on the horizon where attackers can annuitize extortion and ransom over time to increase the value of their revenue streams. It will include spear phishing, social media profile ransom, other doxing, holding data ransom on a machine or network, siphoning out data for later extortion and more we haven’t seen yet. We all need to give credit where it’s due. The outfits that are performing these attacks are very talented and sophisticated and run more mature businesses than a lot of us. A general hardening access of all information surfaces, regardless of being personal or professional, needs to be in the front of everyone’s minds.