Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

The Cybersecurity and Geopolitical podcast - Cyber warfare, cyber mischief and the cost to nation-states, Episode 6

Cybersecurity and Geopolitical podast
August 25, 2021

After a (somewhat enforced) summer recess, The Cybersecurity and Geopolitical podcast returns with Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza taking a sweeping look at some of the main protagonists on the global stage right now: Russia, China, Iran and North Korea. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape.

You can listen to the audio version right here below! (You can also listen on the go anytime, via our Spotify and Apple podcast channels The Security Podcasts.)

Your browser does not support the audio element.

 

This month, we will hear about cyber warfare, cyber mischief and more throughout the geopolitical landscape.

There has certainly been an increase in aggressive rhetoric since Vladimir Putin was re-elected as President of Russia in 2012, much of it directed at the USA. This has pushed many to reach for the Cold War analogy, but this is a mistake according to Tristan. Not least because we live in a distinctly multipolar world – with China firmly in the mix, if not yet the ascendancy – but also because the ways in which these powers face off against each other has changed. The battle arena is now firmly cyberspace.

Indeed, President Biden has warned that cyber war could lead to kinetic conflict, but as Ian points out, this is unlikely because of the sheer cost for both nations in an all-out physical confrontation. Proxy wars in Syria and Ukraine, on the other hand, are just fine. One interesting question that comes up in the podcast is that of the relative cost of cyber warfare for these nation-states. Is there less to lose for Russia and others in targeting the US, than there is in the US targeting them? Or is there just as much at risk – both economically and politically speaking – for all players in the Great Game, because they’re tied into the same, the only, system?

After its audacious hack of Microsoft, there appear to have been far fewer ramifications for China than there were for Russia in the wake of the attacks carried out by Kremlin-affiliated groups against the US. Why is this? The connections are concrete: there simply doesn’t seem to be the will. Tristan notes that many countries appear still to be operating with the view that global politics is a zero-sum game. For Russia, its targeting of the 2016 US elections, for example, was a way of taking the heat off its own beleaguered government and potentially undermining confidence in democracy in the bastion of that form of politics. China, however, appears to be suffering from hubris. There is very little political gain for Beijing in targeting US companies; it is only likely to bring it closer to conflict with the US.

In its 100th year, the CCP appears confident in holding onto power for many decades to come. As such, Ian suggests that state-sponsored actors are being given a freer rein than might otherwise have been the case were the Chinese administration more worried about its ability to stay in charge. There is a clear economic benefit to stealing Intellectual Property from global corporations, and if there are no negative political consequences, then it is unlikely it will stop happening.

Iran is another country in which you could expect longer term planning to be a possibility. A hybrid authoritarian government that has a figurehead above the melee of elections (albeit ones that most consider fatally flawed) who could provide a clear direction over spans much longer than regular democratic terms of government. Except, that in the case of Iran, this doesn’t seem to be what is happening. Sanctions are affecting the country dramatically; the nuclear issue is a particular thorn in the side of the administration in Tehran; and an internal struggle appears to be preventing the country’s cyber threat actors from targeting organizations and people outside the Iranian border. As Ian notes, an “internal insurgency [is] pulling a lot of the cyber threat internally”.

And what of North Korea: ravaged by COVID-19; apparently disinterested in testing any more missiles for the time being; a cyber capability, in Lazarus, that has drawn no warnings from the US intelligence establishment for some time. Are the hermit kingdom’s cyber days numbered? Unlikely, according to Tristan, because silence doesn’t necessarily indicate a lack of action. It’s highly likely that Lazarus and various other North Korean state-affiliated hacking groups are actively attacking financial institutions and political organizations the world over to support the regime in Pyongyang.

Should we consider North Korea to be a full proxy of China, though? Is there an agreement in place that sees information passed from Pyongyang to Beijing? Is North Korea confident enough in its support from the superpower to the north that it would start a kinetic war? Both Ian and Tristan agree that this is possible, but unlikely, on all three counts. No doubt some information is passed between the two countries – probably one way more than the other; no doubt, North Korea is confident in being protected to some degree by China; but there is also no doubt that Xi Jinping and the CCP, as mentioned above, think long term. North Korea is clearly unstable. The likelihood of China standing by during (or allowing) a North Korean attack that hurts Beijing’s standing on the global stage is extremely low.

Watch the video version here or listen to the audio podcast version now!

KEYWORDS: Chief Information Security Officer (CISO) cyber security cybersecurity and business cybersecurity defense cybersecurity leadership cybersecurity management geopolitical geopolitical risk risk and resilience security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity and Geopolitical Podcast Episode 7

    The Cybersecurity and Geopolitical Podcast— Morality and cyber risk, role of a CISO, and governmental anti-cybercrime — Episode 7

    See More
  • Cybersecurity and Geopolitical Podcast Episode 8

    Check out Episode 8 of The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or Threat?

    See More
  • Cybersecurity and Geopolitical Podcast Episode 9

    Check out Episode 9 of The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing