Thought Leaders in Cybersecurity

Page 1

May 14 - 27, 2018

www.charlestonbusiness.com 21

SPONSORED BY SC CYBER

Thought Leaders in Cybersecurity A Roundtable Discussion With so much of our lives, both professional and private, now connected to the internet, the concern over security grows daily. In this special section, thought leaders in cybersecurity provide insights into the issues and the steps you can take to protect your data and devices.

David Furr

Paul Ihme

Richard J. Krenmayer

Valerie Sessions

Cyber Attorney Gray, Layton, Kersh, Solomon, Furr and Smith PA

President of Consulting Services Soteria LLC

CEO Stasmayer Inc.

Professor and Chair Computer Science Department Charleston Southern University Computer Scientist SPAWAR, Atlantic

What emerging threats do you believe will impact your clients soon and how are you advising them? DAVID FURR/GRAY, LAYTON, KERSH: Our practice deals mainly with the small and medium businesses (SMB). (US Chamber defines SMB as revenues less than $1.2B or 1,000 employees.) Cybersecurity is nothing more than a critical subset of enterprise risk management. SMBs have a 70% chance of being hacked and even more importantly, 60% go out of business within 18 months of a hack. These are astonishing figures!

Just like the large enterprises, SMBs are fighting day-to-day in a competitive business world to provide their services or products profitably. They do not have the manpower or the technological wherewithal to cope with the cyber threats that face them on a daily basis. Unfortunately, security by obscurity is not a viable solution. These threats are not just from the shadowing figures abroad. We are seeing the emergence of domestic hacking as a competitive means. As varied as financial hacks to the intellectual property hacks to even litigation strategy hacks – ALL are appearing on the horizon of business interference threats.

RICHARD KRENMAYER, STASMAYER INC.: I believe a more sophisticated type of ransomware is on the horizon where attackers can annuitize extortion and ransom over time to increase the value of their revenue streams. It will include spear phishing, social media profile ransom, other doxing, holding data ransom on a machine or network, siphoning out data for later extortion and more we haven’t seen yet. We all need to give credit where it’s due. The outfits that are performing these attacks are very talented and sophisticated and run more mature businesses than a lot of us. A general hardening access of all information surfaces, regardless of being personal or professional, needs to be in the front of everyone’s minds.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.