Reality of Cyber Warfare: What It Means for Our Technological Reliance

Reality of Cyber Warfare: What It Means for Our Technological Reliance

As a species, we have become increasingly dependent on technology, a fact that hasn't gone unnoticed by various observers. Infosec experts have long discussed the concept of cyber warfare—its potential appearance, methods of execution, and warning signs to watch out for. However, until now, our understanding of this phenomenon has been limited, as it was largely theoretical. Presently, due to the ongoing global events, we are faced with a stark reality where cyber warfare could potentially manifest on a large scale. Join us as we delve into the implications of this emerging threat, exploring its intersection with traditional warfare and shedding light on the hidden world of espionage. Stay informed and prepared as we navigate the complex landscape of technological vulnerabilities and the growing need for cyber defense.

Watch the full video "Reality of Cyber Warfare" https://youtu.be/QRI2AeV8zd4

GUEST BIOS

Oliver Rochford
Oliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for SecurityWeek, CSO Online and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP Market. In past lives, Oliver worked for Qualys, Verizon, Gartner, Tenable and Securonix and is currently Chief Furitist at Tenzir, where he works on product strategy and marketing.

Victor Acin
Victor Acin has been working in threat intelligence since 2016 and is now leading the Kraken Labs unit at Outpost24, performing tasks related to the generation of threat intelligence (mainly reverse engineering of malicious samples and research of global actors), and the development of the department's internal products, such as the malware analysis sandbox. In addition, he has also worked as an ethical hacker, performing penetration tests against web applications, external and internal infrastructure, and mobile devices.

Resources Mentioned

Sun Tzu - Art of War
Facebook report on campaigns targeting army officers from Ukraine
Cambridge Analytica Legal Case
TikTok Ban USA

Other episodes you'll enjoy

Defence In Depth: Strengthening Your Cyber Security Strategy
https://www.razorthorn.com/defence-in-depth-strengthening-your-cyber-security-strategy/

Cyber security and Critical Infrastructure: Are We Prepared for the Worst?
https://www.razorthorn.com/critical-infrastructure/

For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com.
If you need consultation, visit www.razorthorn.com, We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion.

Linkedin: Razorthorn Security
Youtube: Razorthorn Security
Twitter: @RazorThornLTD
Website: www.razorthorn.com