Lieberman Software provides privileged identity management and security management solutions to more than 1000 customers worldwide, including 40 percent of the Fortune 50. By automatically discovering and managing privileged accounts everywhere on the network, Lieberman Software helps secure access to sensitive systems and data, thereby reducing internal and external security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. The company developed the first solution for the privileged identity management space, and its products continue to lead this market in features and functionality. Lieberman Software is headquartered in Los Angeles, CA with an office in Austin, TX and channel partners throughout the world.
In the following interview, Philip Lieberman, President and CEO of Lieberman Software, discusses 1:1 with Rake Narang, Editor-in-Chief of Network Products Guide, the high-level approach CIOs and CSOs should take when it comes to social networks and mobile devices.
Rake Narang: Would the next world war be a cyber war?
Philip Lieberman: We are already in a worldwide cyber war against forces that include foreign powers, foreign corporate entities, anarchists, criminals and sociopaths. The extent of serious damage to date has not affected the common man except for the periodic compromise of credit cards, identity theft and denial of service of services for both short and extended periods of time, but to date none of these interruptions of service have been life threatening…yet.
Of concern has been the leakage of national security secrets, leading edge defense designs, as well as huge amounts of intellectual property. We are starting to see the use of this information in the creation of new industries, better products, and successful bidding by the use of inside information.
In other cases, nation states with objectives divergent to the west as well as those with dreams of a world religious theocracy are considering as well as planning the next world war in cyber space. My guess is that they may understand that a serious attack in cyber space that causes harm to U.S. citizens will most likely result in a kinetic weapon response.
The moment an entity actually goes beyond simple criminal, ID theft, and IP theft and escalates into permanent damage designed to physically hurt us, then the battlefield will shift from bits to bombs. Undoubtedly those capable of such an action will act pragmatically and not pull the trigger the next step in cyber warfare.