James.qxp Nov Dec 2018 web - Page 27



Authority and MARTA so that our plan accounted for
each perspective. As a result, our vision for the future is
clear and easy to communicate.
KENT Tell us about the factors that were most important
to accomplish?
HANLON In my view, three foundational factors of success
for any CID are a clear vision, funding by which to realize
that vision and relationships. Over the last 12 months, we
have been deliberate in addressing each of those three
areas. A concise plan is paramount, but relationships are at
the heart of all we do. Early on, I brought in Linda Johnson,
who has state, county and
municipal experience, to be
our liaison to elected officials,
transportation agencies and
the community. It was a top
priority for me to establish
strong and trusted relationships across the community.
We are further supported by
a great staff that handles the
sometimes-mundane work of
project management that is
critical to delivering a successful product to our CID
members and partners.
huge impact on our Perimeter market. We look forward to
working with GDOT and city leaders to help identify and
coordinate access to the system and delivery of these historic projects.
KENT What state/regional projects are a priority and how
will they most affect the North Fulton/Dekalb area?
HANLON The managed lanes along I-285 and GA 400 may
ultimately be what effects the central perimeter area and
our region the most. These projects are transformative to
the entire state. With the 285/400 interchange project
already underway, we also continue to monitor progress
and keep our constituents
informed of daily lane closures and other commuting
issues. We are excited to
have the 285/400 interchange complete in 2020
and we will be poised for
the next projects coming
down the pipeline.
We recently invested
$15,000 to help fund a transit study for the top end of I285. I am thankful to the
mayors involved and we
remain optimistic for the
study findings. The
Perimeter market has a
KENT What local projects are
great differentiator by hava priority for your boards of
ing four MARTA stations in
directors to invest in?
the area, and growing the
THE I-285/GA 400 INTERCHANGE PROJECT
transit system regionally
HANLON Our Master Plan
would strengthen our posiconcentrates on three main
tion nationally as a healthy, thriving business district.
objectives: access, mobility and sense of place. We carefully evaluated each proposed project with those goals
in mind. After thoughtful vetting, several projects have
KENT How are you and the board of directors positioning
risen to the top of the list that our boards are especially
PCIDs for the future?
interested in, including the completion of the Path 400
project north from Buckhead that was the brainchild of
HANLON Our board of directors has a keen understandLivable Buckhead and the Buckhead CID. That project
ing of the Perimeter markets both past and present.
will eventually connect to the Beltline and would be an
This year has given us the opportunity to position this
amazing connection for pedestrians to safely travel
market for the future by being a vital part of whatever
between Buckhead and Perimeter.
the next iteration may be. Changes in technology are
Several local trail projects are at the top of the list as
rapidly affecting decisions and investments, and we
well, including the trail along Ashford Dunwoody Road
must adapt to those changes. I am absolutely thrilled
and Perimeter Mall, and the new trail connections to the
and honored to be part of the great team of staff, board
Dunwoody MARTA station. More regionally, the state
members, and community partners who make
managed lanes projects over the next 10 years will have a
Perimeter special. Together, we all look forward to many
fruitful years of investment.
26
JAMES
N OV E M B E R / D E C E M B E R 2 0 1 8
O
ctober was Cybersecurity
Awareness Month and
devoted to raising
awareness for
better data protections at
home and at work. Yet
we don’t really need a
month-long celebration to
remind us that security risks in
our digital world are steadily growing. All we need to do is look at the news.
Uber settled claims related to a 2016 data breach the
company hid from regulators and consumers for the
record-breaking sum of $148 million. We marked the oneyear anniversary of the data breach at Atlanta-based
Equifax. And we learned Facebook was hacked by
unknown parties who gained access to 50 million users’
data— a breach that could draw a $1.6 billion fine from
European Union regulators.
Since California’s first-in-the-world data breach notification law went into effect in 2014, we have seen a
steady, year-over-year increase in cybersecurity-related
data breaches according to the San Diego-based Identity
Theft Resource Center. The number of U.S. data
breaches hit a new record high in 2017 of 1,579 breaches,
a 45 percent increase over the previous record high
reported in 2016. Sixty percent of the 2017 breaches
were the result of cyberattacks.
The number of attacks is not the only statistic on
the rise. A 2018 Ponemon Institute report indicates that
the average cost of a U.S. cyber-related data
breach exceeds $7.9 million. Organizations that still rely
on traditional security tools can
add $1.55 million more to their breach costs. A reasonable person might look at these facts and ask: If some of
the most technologically sophisticated organizations on
the planet cannot prevent hackers from breaching their
systems, what is the solution?
The How and Why
of a Cybersecurity Attack
To understand the solutions, we must first understand the problem. Why and how do hackers attack organizations? The reasons are relatively simple, but the
methods are sophisticated. Gone are the days of hackers
sitting in their parents’ basements trying to break into
their school computer system to change grades for fun
and street cred.
Today, hacking is generally about one of two things:
data theft for profit or disruption. Hackers associated
with organized crime steal data with a view to selling it
in the black market of the Internet— aka the Dark Web.
Gold and crypto-currency are the coin of the realm.
These high-tech thieves assemble or steal digital
dossiers that are then sold to the highest bidder or for a
set price. Your personal information is worth less than
$10 on the dark-web.
Security researcher Brian Krebs notes that you can
buy five adult “fullz”— that’s hacker-speak for a complete set of data on a person— for $40. Earlier this year,
CNN reported that complete data for an infant— SSN,
mother’s maiden name, and DOB –could fetch $300
per child. A credit card number with pin and mag stripe
data could range from $75— $100 per card depending
on the brand of card.
How hackers do it is relatively straightforward. They
use multiple methods, but one of the primary approaches involves the use of automated tools scanning the web
for known software flaws. As soon as the scanner finds a
flaw, the hackers begin to probe the website to
determine if they can successfully breach a system. Once
that’s done, they take a stroll through the system to
see what data is available and if it has value.
continued on page 28
N OV E M B E R / D E C E M B E R 2 0 1 8
27

Paperturn



Powered by


Full screen Click to read
Paperturn flipbook viewer
Search
Overview
Download as PDF
Print
Shopping cart
Full screen
Exit full screen