Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Geopolitical Cyber Threats & Defense Strategies

Rubrik
05/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Nation-state cyber operations during geopolitical conflicts fall into two categories: quiet espionage for intelligence advantage and noisy effects operations (ransomware, DDoS) designed to demonstrate attribution and alignment with physical conflicts.
  • Every organization will eventually be caught up in geopolitical cyber operations regardless of intent, making proactive defense preparation essential before becoming a target rather than scrambling after an attack.
  • Federal resources (CISA, NSA, DOD Cybercrime Center) and Information Sharing and Analysis Centers (ISACs) provide affordable threat intelligence and guidance for under-resourced organizations, while industry collaboration strengthens collective defenses.
  • Understanding human culture and behavior is vital to cyber threat intelligence—cultural indicators in malware code, language settings, and infrastructure choices provide attribution clues about threat actors' origins and motivations.
  • Cybersecurity education needs specialization (SOC analyst vs. penetration tester vs. threat hunter) and emphasis on critical thinking over tool-specific training to prepare professionals for the field's dynamic, ambiguous nature.
  • Diverse educational backgrounds including anthropology, business, and literature develop the creative and analytical thinking skills essential for cybersecurity careers, challenging the computer science degree monopoly.

Cyber Operations in Geopolitical Conflict

Dustin Droullard, a former Army intelligence analyst turned cyber threat intelligence expert, explains how nation-state cyber operations manifest during geopolitical tensions. He distinguishes between two primary approaches: espionage (quiet intelligence collection for strategic advantage) and effects (noisy operations like ransomware and DDoS intended to demonstrate attribution and alignment with geopolitical events). While cyber warfare hasn't yet reached the prominence many predicted, recent conflicts involving Iran, Israel, China, and North Korea demonstrate the convergence of kinetic and digital operations. Iranian banks were targeted in retaliation, Israeli tech research facilities faced physical missile strikes to eliminate cyber capabilities, and China's Volt Typhoon campaign appears to be staging infrastructure for future operations. Droullard emphasizes that every organization will eventually be caught up in geopolitical affairs regardless of intent, making proactive defense preparation essential before becoming a target.

Accessible Defense Resources for Under-Resourced Organizations

For organizations lacking massive cybersecurity budgets, Droullard highlights several accessible resources. Federal agencies like CISA provide critical infrastructure guidance, while the NSA and DOD Cybercrime Center offer support for government contractors. Information Sharing and Analysis Centers (ISACs) deliver affordable, sector-specific threat intelligence feeds. He advocates for industry collaboration, even among competitors, arguing that sharing threat information strengthens collective defenses without harming individual organizations. This counterintuitive approach recognizes that geopolitical threats target entire sectors, making cooperation a strategic necessity rather than a competitive risk.

The Human Factor in Cyber Intelligence

Droullard's anthropology background informs his approach to cyber threat intelligence, emphasizing that all technology is fundamentally human-created and human-operated. Cultural indicators embedded in malware source code, language settings, and infrastructure choices provide attribution clues about threat actors' geographic and cultural origins. Understanding human behavior, cultural contexts, and linguistic patterns enhances open-source intelligence investigations and strategic analysis. He argues that diverse educational backgrounds—anthropology, business, literature—develop the critical thinking skills essential for cybersecurity, challenging the notion that only computer science degrees prepare professionals for the field.

Reforming Cybersecurity Education

As an instructor at the Institute of World Politics, Droullard critiques current cybersecurity education for remaining siloed and overly generalized. He advocates for programs that integrate technical foundations with business acumen and geopolitical awareness, preparing graduates to collaborate across disciplines. Specializations are essential—SOC analysts, penetration testers, threat hunters, and CTI analysts require distinct skill sets that generalized programs fail to develop. Above all, he emphasizes critical thinking over tool-specific training, arguing that cybersecurity's dynamic nature demands professionals who can develop hypotheses, pivot on information, and operate in ambiguous scenarios rather than following prescribed workflows.

Chapters

0:00 - Introduction
0:33 - From Army Intelligence to Cyber
2:45 - Espionage vs. Effects Operations
6:38 - Disinformation and Influence Campaigns
10:39 - Every Business as a Target
13:21 - Federal and Nonprofit Defense Resources
15:57 - Anthropology's Role in Cyber Intelligence
20:33 - Diverse Majors for Cyber Careers
23:03 - Reforming Cybersecurity Education
26:53 - Final Thoughts

Key Quotes

0:00 "It's just a matter of time that just about any companies, they're gonna get caught up into some kind of geopolitical affairs, even if they have no intention to, right? You may have no political ties or intentions or anything, but your company can very easily get tied in."
4:02 "When it comes to cyber conflict, you kind of have two different methods. You have espionage and you have effects, right? You can combine the two, but in a general sense, when there are military actions or some kind of geopolitical events, right? You can conduct espionage in cyberspace."
5:23 "I would say overall, cyber hasn't come into play quite as prominently as we assumed. There's a lot of theory of how cyber's gonna be a major factor within warfare, and we haven't seen it quite yet."
15:05 "If it's a matter of keeping the industry safe, that sharing threat information is not going to hurt anybody, right? If you can both bolster your defenses, that's everybody wins there."
16:29 "I've heard the saying all tech is human, right? It's technology is made by humans for humans, right? And so there's always going to be that human factor in tech and cyber and all that kind of stuff."
24:41 "I think if it has the word cyber in the program, it needs to have some baseline technical foundation. You don't have to be a computer scientist to be in cyber, but you've got to have some kind of technical acumen."

Categories:
  • » Webinar Library » Rubrik
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Threat Intelligence
  • Cloud Security
  • Executive Briefing
  • Best Practices
  • Security Operations
  • Geopolitical Cyber Operations
  • Nation-State Threat Actors
  • Cyber Espionage
  • Influence Operations
  • Critical Infrastructure Defense
  • Threat Intelligence Sharing
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Geopolitical Cyber Threats & Defense Strategies

              Upcoming Webinar Calendar

              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-reveal-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                12

                Implementing Effective Strategies for Active Directory Security and Data Protection

                05/12/202611:30 PM ET
                • May
                  13

                  Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage

                  05/13/202601:00 AM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202605:00 AM ET
                    • May
                      19

                      Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                      05/19/202601:00 PM ET
                      • May
                        20

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/20/202608:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version