Decoding Cyber Warfare: Unveiling the Covert Battle for Control

Decoding Cyber Warfare: Unveiling the Covert Battle for Control

Prepare to enter the shadowy world of cyber warfare, where governments across the globe engage in a hidden struggle for dominance. In this captivating video, we delve deep into the intricacies of this clandestine battleground, exposing its low-frequency maneuvers and revealing how it affects us all. Join us as we explore the enigmatic realm of cyber espionage and its impact on the modern world. Discover why cyber warfare intertwines with traditional conflicts, acting as a vanguard of chaos and a weapon to disable strategic targets. From the high-profile incidents in Ukraine to the unseen battles waged behind the scenes, this eye-opening discussion uncovers the truth behind a global phenomenon that resonates far beyond our screens. Get ready to decode the secrets of cyber warfare and gain a new perspective on the unseen forces shaping our digital landscape.

Watch the full video "Reality of Cyber Warfare" https://youtu.be/QRI2AeV8zd4

GUEST BIOS

Oliver Rochford
Oliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for SecurityWeek, CSO Online and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP Market. In past lives, Oliver worked for Qualys, Verizon, Gartner, Tenable and Securonix and is currently Chief Furitist at Tenzir, where he works on product strategy and marketing.

Victor Acin
Victor Acin has been working in threat intelligence since 2016 and is now leading the Kraken Labs unit at Outpost24, performing tasks related to the generation of threat intelligence (mainly reverse engineering of malicious samples and research of global actors), and the development of the department's internal products, such as the malware analysis sandbox. In addition, he has also worked as an ethical hacker, performing penetration tests against web applications, external and internal infrastructure, and mobile devices.

Resources Mentioned

Sun Tzu - Art of War
Facebook report on campaigns targeting army officers from Ukraine
Cambridge Analytica Legal Case
TikTok Ban USA

Other episodes you'll enjoy

Defence In Depth: Strengthening Your Cyber Security Strategy
https://www.razorthorn.com/defence-in-depth-strengthening-your-cyber-security-strategy/

Cyber security and Critical Infrastructure: Are We Prepared for the Worst?
https://www.razorthorn.com/critical-infrastructure/

For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com.
If you need consultation, visit www.razorthorn.com, We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion.

Linkedin: Razorthorn Security
Youtube: Razorthorn Security
Twitter: @RazorThornLTD
Website: www.razorthorn.com