Jan 12, 2026

Podcast: How CISOs Must Prepare for the Shadow Cyber War

Subscribe on Your Preferred Platform


In This Episode

We’ve moved past the era of muskets and moved into the era of malware. In the latest episode of the Cyber Resilience Brief, host Tova Dvorin and security expert Adrian dive into the “Fifth Domain of Warfare”—a man-made battlefield where strategic paralysis can be achieved from behind a keyboard.

If you think your organization is a bystander in global tensions, think again. In a state of “persistent engagement,” your network is likely being probed right now by nation-state actors with very different, very dangerous agendas:

  • Russia: Master of hybrid warfare and chaos. Focus: Destabilizing alliances and eroding trust.
  • China: The long game. Focus: Intellectual property theft and deep, persistent access to critical infrastructure.
  • Iran: Regional dominance and retaliation. Focus: Destructive probing of industrial control systems (OT).
  • North Korea: Regime survival. Focus: Cryptocurrency theft and global banking intrusions.

The Challenge: Most security teams are still playing a reactive game. But as Adrian points out: “You don’t have to get hacked to understand how you can get hacked.”

The 3-Step Strategy for Resilience:

  • Stop Point-in-Time Testing: Implement a continuous testing program today.
  • Know Your Enemy: Identify which of the “Big Four” threat actors are most relevant to your specific industry.
  • Validate, Don’t Guess: Use BAS (Breach & Attack Simulation) and CART (Continuous Automated Red Teaming) to mimic actual campaigns—not just single exploits.

The lines between peace and conflict have blurred. Are your digital defenses mature enough to survive the shadow war?