Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementSecurity & Business Resilience

Episode 5 of the Cybersecurity and Geopolitical podcast is up!

Cybersecurity and Geopolitical podcast - June 2021 episode
June 29, 2021

Security brings you the monthly Cybersecurity and Geopolitical vodcast from Cyjax CISO Ian Thornton-Trump that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals.

This month’s entertaining podcast takes place back in-person from a pub in the U.K, with a wide-ranging conversation covering America’s potentially myopic focus on Russia; the Colonial Pipeline hack and ransomware; as well as cryptocurrency and traceability.

Watch the Episode now!

If you prefer to listen to the audio version, you can listen to directly from our website or through our Apple Podcasts or Spotify at The Security Magazine Podcasts! (Don't forget to follow our channel on Apple or Spotify and rate and review us!) 

(You can also Listen to this month's episode right here!)

Your browser does not support the audio element.

This month’s podcast saw a change of personnel, with Philip Ingram MBE joining Ian – in person! – while Tristan was away. The conversation is as wide-ranging as ever, moving from America’s Russia-phobia putting the blinkers on Biden and ending up in Belarus, with explorations of Bitcoin, ransomware, and the Israel/Palestine conflict along the way.

But first: Russia, and America’s potentially myopic focus on the country and its leader. The change of personnel in the White House has meant a shift from amicability to aggression. Biden is being tested time and time again by the Putin regime and it seems that the US may have taken its eye off the threat from China particularly.

The recent Colonial Pipeline hack is just the latest example of Russian moves in cyberspace. This, says Philip, is indicative of the biggest threat to the US right now: ransomware. There is no doubt that state-sponsored operatives are being used to attack and disrupt critical infrastructure in the US. False flag mechanisms make it harder to trace and these threat actors are targeting government secrets and IP that would be particularly sensitive if they fell into the hands of a foreign regime.

Not so long ago, the received wisdom concerning cryptocurrency and its traceability was that this was impossible, and users of digital coins were effectively immune from prosecution. The seizure of servers linked to the cybercriminals behind the Colonial Pipeline attack demonstrates this is no longer the case. Philip points out the law enforcement are belatedly catching onto the ‘immutability’ of all transactions in Bitcoin’s public key blockchain, and Ian concurs that it is now the case that anyone who has engaged in criminality using Bitcoin is at risk of being caught.

Next stop, Israel. Why the silence from Iran? Is the country’s influence now contained? Philip categorically states this is not the case. Rather, Iran is just engaged elsewhere, focusing almost exclusively on its proxy war with Saudi Arabia in Yemen. Furthermore, the regime in Tehran has had its fingers burned this year with fires at the Natanz nuclear plant, an oil refinery and on its largest warship (the last two on the same day). We haven’t heard the last Iranian opinion on the Arab-Israeli conflict.

Finally, Ian and Philip check in on Aleksandr Lukashenko and his team in Belarus. Did they really need to redirect an airliner to get their man? What was the endgame here? It seems it was a similar playbook to the one employed by the Russians in Salisbury and London: wherever you are, you’re at risk if you speak out against our regime. Interestingly, Philip states this may also have been a bit of Putin manipulation, with Lukashenko getting the Russian leader to flex his muscles and show his domination of his sphere of influence.

Philip and Ian end with a quick tour round the key Hot Spots for 2021. But you’ll have to listen to the podcast for that!

KEYWORDS: Chief Information Security Officer (CISO) cyber security cyber security leadership cyber security threat cybersecurity and geopolitical podcast security risk assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity and Geopolitical Podcast Episode 8

    Check out Episode 8 of The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or Threat?

    See More
  • Cybersecurity and Geopolitical Podcast Episode 9

    Check out Episode 9 of The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist

    See More
  • Cybersecurity and Geopolitical Podcast Episode 7

    The Cybersecurity and Geopolitical Podcast— Morality and cyber risk, role of a CISO, and governmental anti-cybercrime — Episode 7

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing