West Virginia Executive Fall 2022 | Page 51

Cybersecurity in West Virginia

An Emergent Modern Defense

JEAN HARDIMAN
In today ’ s world , it is uncommon for anyone to experience a day untouched by the cyber industry . For many , information technology ( IT ) infiltrates most aspects of life , beginning the moment they wake up to their cellphone alarm and continuing throughout the day while working , shopping , banking and interacting with the modern world online .
“ Cybersecurity impacts all users and citizens , regardless of their profession ,” says Lexy Guenther , chief technology officer for enterprise IT and mission solutions operations at Leidos . “ The interconnectedness of people and technology has put the cyber industry front and center and illustrated the need to build security into all our projects and methodologies .”
Leidos is the contractor hired to protect the cyber and enterprise security operations for federal agencies in West Virginia , including the National Oceanic and Atmospheric Administration , FBI and U . S . Department of Defense ( DOD ).
The company is one example of how the Mountain State is staying in step with increasingly important cybersecurity measures for businesses and organizations of all kinds . From private businesses to the military to higher education , the efforts to protect the businesses and people of West Virginia from cyberattacks are more important than ever .
“ Cybersecurity is akin to physical security and insurance costs that businesses used to incur 25 years back ,” says Chetan Desai , COO of NextGen Federal Systems . “ A business must place proper controls to secure its IT assets and protect itself from cybercrime-related liabilities . Businesses that develop intellectual property have to take additional measures to ensure that it is not stolen or duplicated by another company anywhere in the world .”
Companies worldwide lose billions annually due to cyberattacks .
“ The reality is that there is no getting around it . Companies cannot risk the
disruption and revenue loss from cyberattacks ,” says Jim Estep , president and CEO of the High Technology Foundation . “ Even a perceived vulnerability to cyberattacks can have a negative reputational impact .”
So , what is considered a cyberattack ? According to Lieutenant Colonel William Hargis , director of joint communications for the West Virginia National Guard ( WVNG ), the DOD defines it as any hostile act using a computer or related network or system that is intended to disrupt and / or destroy an adversary ’ s critical cyber systems , assets or functions .
“ Cyberattacks , like any crime , are made possible with malicious motive and means ,” Guenther says .
Attackers have increased access to tactics , techniques , procedures and tools to carry out the attacks , and there has also been an increase in attacker collaborations .
The possibilities are alarming . There have been instances across the country
WWW . WVEXECUTIVE . COM FALL 2022 49