ANN ARBOR – Cybersecurity experts Dan Lohrmann and Richard Stiennon provide details on how the Russians hacked the Solarwinds networking software used by US government and nearly all the Fortune 500 companies in America.

Russia’s hack of IT management company SolarWinds began as far back as March, and it only came to light when the perpetrators used that access to break into the cybersecurity firm FireEye, which first disclosed a breach on December 9. Since then, a cascading number of victims have been identified, including the US Departments of State, Homeland Security, Commerce, and the Treasury, as well as the National Institutes of Health. The nature of the attack—and the tremendous care taken by the hackers—means it could be months or longer before the extent of the damage is known. The impact is already devastating, though, and it underscores just how ill-prepared the US was to defend against a known threat—and to respond. It’s also ongoing, Wired magazine reported.


Dan Lohrmann – Chief Strategist & Chief Security OfficerSecurity Mentor

Dan Lohrmann

* Executive advisor and management coach on cybersecurity and technology infrastructure solutions and plans.
* Lead efforts to define and develop key strategic initiatives for the company’s award-winning security awareness training offerings.
* Provide thought leadership regarding cybersecurity and online privacy trends in public and private sectors.

Lohrmann was Michigan’s first Chief Security Officer (CSO) & Deputy Director within Michigan’s Department of Technology Management & Budget (DTMB). Dan oversaw all aspects of cybersecurity, physical security, department emergency management, and critical infrastructure protection within state government.



Richard Stiennon, Chief Research Analyst, IT-Harvest

IT-Harvest is an industry analyst firm that covers the 2,336 vendors in the IT security industry. Founded in 2005. Our recent publication, Security Yearbook 2020: A History and Directory of the IT Security Industry, was launched at RSA Conference 2020 and available from . Starting in June, 2020, we are initiating market research reports on several sectors including threat intelligence.

6 Publications

CyberWar and the Malware Blame Game

There Will Be Cyberwar

HeartBleed Discussion with Richard Stiennon

UP and to the RIGHT: Strategy and Tactics of Analyst Access

Richard Stiennon & Bill Conner Discuss State of the Cybersecurity Industry

Surviving Cyberwar