Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Geopolitics & cybersecurity are intrinsically linked. Cyber strategies must shift

By Yaron Tal
geopolitics-cybersecurity-fp1170.jpg

Image by goinyk via Freepik

August 24, 2022

For any seasoned CEO, cybersecurity and geopolitics are individual concerns. An EY CEO Imperative Study notes that 63% of Forbes Global 2000 chief executives ranked digital transformation as the top business concern. In contrast, the same CEOs ranked geopolitics last in corporate impact, with a measly 28% pointing to political risk management as their number one priority. 


The situation in Ukraine, and Russia’s reputation for using weaponized cyber tools on desired targets, have put chief information security officers (CISOs) on their toes. It raises the question of how organizations approach cybersecurity and geopolitics risks as a whole — in siloes.


In times of crisis, organizations must minimize the threshold for attack and maximize their ability to detect potential intrusions, relying on up-to-date network traffic analysis and constant, real-time mapping of their external attack surface to protect their assets. Though CISOs shape the strategy and action plan, an element of cross-functionality must be addressed across the entire enterprise.


To shift from siloed thinking to cooperation, cybersecurity teams of large, multinational organizations must work to better elevate security importance across all teams. Cybersecurity concerns no longer sit comfortably in the IT department. Marketing and development departments often create web pages and other online assets for development, later leaving them to slip through the cracks, expanding their external attack surface in the process.


CISOs must lobby for collaboration across policy and business operations to cover their geopolitical bases while educating the wider company on the critical importance of reporting created assets to internal security functions. 


Failing to do so puts organizations in the firing line of cyberattack, potentially by nation-state hacker groups. 


How vulnerable are organizations to nation-state attacks?

A recent report, Nation States, Cyberconflict and the Web of Profit by HP notes that nation-state cyberattacks have doubled over the last three years, with supply chain attacks rising by a margin of 78%, and finds that over 40% of cyberattack assets include a physical and digital component — a phenomenon known as hybridization.


In addition, we must look to the actions of companies to confirm their risk awareness. Both enterprises and government agencies are aware of nation-state threats and are taking steps in anticipation. The U.S. recently announced it secretly removed malware from computer networks worldwide, while Asian corporations are calling for increased government support to defend against nation-state cyberattacks. 


To assess how vulnerable organizations are, the first port of call should be the state of their external attack surface. The fact is that organizations aren’t protected at the best of times, let alone in the context of geopolitical cyber warfare.


Recent Reposify reports of the cybersecurity, pharmaceutical, gaming and financial industries have found astounding gaps in the security posture of their external attack surface. Ninety-seven percent of cybersecurity companies host exposed assets in AWS. Ninety-two percent of pharmaceutical companies, followed by 55% of gaming companies and 52% of cybersecurity companies, all house a database vulnerable to attack and ultimately to leaked data. 


When coupled with the rise in nation-state actor threats, it’s clear that geopolitical cyber warfare poses an undue risk to organizations when they’re already housing significant vulnerability. CISOs can only work to protect what they know is there and must begin with their most vulnerable, external-facing assets. 


Continuous, real-time asset monitoring is paramount to defeating nation-state threats

In the aftermath of the seismic cybersecurity shift that was 2020, CISOs are still working to fight growing pains. Increased reliance on cloud services, a growing number of subsidiaries and a rise in the remote workforce — and therefore remote access applications — have led to exponential digital footprint growth that crosses international boundaries.


The cybersecurity suite of solutions is cumbersome and has contributed to the digital footprint problem and resulted in alert fatigue for many CISOs (e.g., Solarwinds exploit). Cybersecurity teams are hopeful that the future will bring a more streamlined approach, but resiliency and preparedness must come first. 


The Gartner Top Security and Risk Management Trends for 2022 identified attack surface expansion, digital supply chain risk and identity threat protection and response as the top concerns for CISOs this year and beyond. In the context of the geopolitical landscape, undoubtedly, these threats will color cybersecurity strategy with paranoia.


Organizations must become more resilient, adopting integrated cyber risk management supported by a risk-aware culture and enabling technologies. 


For cybersecurity strategies of tomorrow, knowledge and awareness are paramount. Critically, CISOs and security teams can only apply integrated cyber risk matrices to assets they know are there.


External attack surface management (EASM) security technology is ideally placed to fill this gap, supporting the time-consuming asset management work security professionals must complete as a part of a resilient cybersecurity posture. EASM is not a technology to be supported but rather a technology to support CISOs and security leaders.


In the context of evolving threats and nation-state actors — whose sophisticated attacks cannot be predicted, only anticipated — assets must be continuously monitored in real time. 


Where should CISOs be focusing their efforts? 

The problem with attacks from nation-state actors is the level of sophistication, and masquerading CISOs are contending with. This is their main point of differentiation from the “everyday” hack: nation-state cyber teams have CSS and exploit vulnerabilities created under the radar and accumulated in anticipation of the perfect time to strike.


The HP report notes that COVID-19 presented a massive opportunity to nation-state actors, with evidence that several are “stock-piling” zero-day vulnerabilities to leverage against organizations associated with a particular country or the governments themselves. 


Zero day RCE threats, which see unprivileged external code compromise any exposed machine in the network, are of particular concern given their severity. Their consequences span any number of possibilities — lost or stolen data, proxied communications, hacked private drives or potential damage to corporate reputation or stolen IP. 


Though there are immediate steps organizations can take to protect their assets, like updating their asset inventory and securing their digital perimeter and monitoring their external perimeter, organizations are limited to only protecting assets teams are aware of. 


The backbone of any geopolitical cybersecurity strategy

Given the increased likelihood of nation-state threat, the top security risk management trends around attack surface expansion, digital supply chain risk and identity threat protection and response, and the proven vulnerability organizations house as a part of their external attack surface, it’s clear that CISOs must first arm themselves with knowledge. 


Updated asset inventories are critical to integrated cyber risk strategy, updating in real time where organizations are most vulnerable to attack so that CISOs can reinforce liable assets — like databases, remote access sites and web servers and close unnecessary holes like unused ports.


In the context of geopolitical risk, CEOs must recognize and act on the implications of political risk, working closely with their cybersecurity teams to underpin digital transformation and technology adaptation strategies with a thorough cybersecurity posture. Success can only be achieved with buy-in from the entire organization, elevating the profile of security protocol across all teams and functions. 


Still, external attack surface management technology can help CISOs, CIOs & SoC/NoC Managers deploy a watchful eye over their digital perimeter. Constant, real-time asset management is essential to any integrated risk management strategy — especially in today’s context.


Editor's Note: For an entertaining and informational discussion on cybersecurity and geopolitical issues affecting organizations globally:

  • Watch Security's Cybersecurity and Geopolitical vodcast here 
  • Or listen on our podcast page, Spotify or Apple Podcasts
KEYWORDS: cyber security geopolitical risk information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Yaron tal

Yaron Tal, Founder and CTO of Reposify, is an accomplished tech entrepreneur and cybersecurity expert with close to two decades of experience in development of software solutions for cybersecurity. Prior to founding Reposify, Yaron held various managerial roles at startups where he gained extensive experience in leading R&D teams and developing successful solutions from the ground up. Yaron is an alumnus of the Israeli Cybersecurity Center where he served for over four years as an embedded system developer, researcher and team leader.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • budget

    Security Leaders Must Adjust Cybersecurity Budgets to Effectively Address 2018 Cyber Threats

    See More
  • infrastructure-security-freepik

    Why cybersecurity infrastructure must be prioritized in light of the IRS leak

    See More
  • cybersecurity-data-protection freepik

    Effective cyber risk mitigation requires a holistic mindset-shift

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!