• Skip to content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer

CTOvision.com

Context for the CTO, CIO, CISO and Data Scientist

  • About
    • Contact Us
    • CTOvision Pro
    • Submit A Technology Or Company For Review
    • Newsletter Subscriptions
    • Privacy Policy
    • About Crucial Point
    • Media Partnerships
    • Contributing to the CTOvision.com Blog
  • Tech Guide
    • Cloud Computing
    • Artificial Intelligence
    • Mobile
    • Big Data and Analytics
    • Robots
    • Internet of Things
    • Cyber Security
    • Cryptocurrency and Blockchain
    • Tech Topics
    • Disruptive Tech
    • Research Library
  • Entertainment
    • SciFi
  • Cyber War
  • The Boardroom
  • Careers
    • Training and Education
  • Newsletter
You are here: Home / Cyber War / Cyber War: The Fastest Way to Improve Cybersecurity?

Cyber War: The Fastest Way to Improve Cybersecurity?

MichaelTanji April 16, 2018

90
SHARES
ShareTweetSubscribe

For all the benefits IT in general and the Internet specifically have given us, it has also introduced significant risks to our well-being and way of life. Yet cybersecurity is still not a priority for a majority of people and organizations. No amount of warnings about the risks associated with poor cybersecurity have helped drive significant change. Neither have real-world incidents that get worse and worse every year.

The lack of security in technology is largely a question of economics: people want functional things, not secure things, so that’s what manufacturers and coders produce. We express shock after weaknesses are exposed, and then forget what happened when the next shiny thing comes along. Security problems become particularly disconcerting when we start talking about the Internet of Things, which are not just for our convenience; they can be essential to one’s well-being.

What is it good for?

To be clear: war is a terrible thing. But war is also the mother of considerable ad hoc innovation and inventions that have a deep and wide impact long after the shooting stops. War forces us to make those hard decisions we kept putting off because we were so busy “crushing” and “disrupting” everything. It forces us to re-evaluate what we consider important, like a reliable AND secure grid, like a pacemaker that that works AND cannot be trivially hacked. Some of the positive things we might expect to get out of a cyberwar include:

  • A true understanding of how much we rely on IT in general and the Internet specifically. You don’t know what you’ve got till it’s gone, so the song says, and that’s certainly true of IT. You know IT impacts a great deal of your life, but almost no one understands how far it all goes. The last 20 years has basically been us plugging computers into networks and crossing our fingers. Risk? We really have no idea.
  • A meaningful appreciation for the importance of security. Today, insecurity is an inconvenience. It is not entirely victimless, but increasingly it does not automatically make one a victim. It is a fine, a temporary dip in share price. In war, insecurity means death.
  • The importance of resilience. We are making dumb things ‘smart’ at an unprecedented rate. Left in the dust is the knowledge required to operate sans high technology in the wake of an attack. If you’re pushing 50 or older, you remember how to operate without ATMs, GrubHub, and GPS. Everyone else is literally going to be broke, hungry, and lost in the woods.
  • The creation of practical, effective, scalable solutions. Need to arm a resistance force quickly and cheaply? No problem. Need enough troops to fight in two theaters at opposite ends of the globe? No problem. Need ships tomorrow to get those men and materiel to the fight? No problem. When it has to be done, you find a way.
  • The creation of new opportunities for growth. When you’re tending your victory garden after a 12 hour shift in the ammo plant, or picking up bricks from what used to be your home in Dresden, it’s hard to imagine a world of prosperity. But after war comes a post-war boom. There is no reason to think that the same thing won’t happen again, we just have a hard time conceiving it at this point in time.

In a cyberwar there will be casualties. Perhaps not directly, as you see in a bombing campaign, but the impacts associated with a technologically advanced nation suddenly thrown back into the industrial (or worse) age (think Puerto Rico post-Hurricane Maria). The pain will be felt most severely in the cohorts that pose the greatest risk to internal stability. If you’re used to standing in line for everything, the inability to use IT is not a big a deal. If you’re the nouveau riche of a kleptocracy – or a member of a massive new middle class – and suddenly you’re back with the proles, you’re not going to be happy, and you’re going to question the legitimacy of whomever purports to be in charge, yet can’t keep the lights on or supply potable water.

Change as driven by conflict is a provocative thought experiment, and certainly a worst-case scenario. The most likely situation is the status quo: breaches, fraud, denial, and disruption. If we reassess our relationship with cybersecurity it will certainly be via tragedy, but not necessarily war. Given how we responded to security failings 16 years ago however, it is unclear if those changes will be effective, much less ideal.

  • About
  • Latest Posts
MichaelTanji

MichaelTanji

COO at Senrio
Michael is a former soldier and intelligence officer who at one point managed the DIWS for cyber threat. He has spent most of the last decade starting and running various cybersecurity start-ups.
MichaelTanji

Latest posts by MichaelTanji

  • Cyber War: The Fastest Way to Improve Cybersecurity? - April 16, 2018
  • The (Dis)Illusion of Control - April 13, 2012

Share this:

  • LinkedIn
  • Facebook
  • Twitter

Related

Filed Under: CTO, Cyber Security, Cyber Threats, Cyber War, News

Stay In The Loop: Sign Up To Receive Daily, Weekly or Monthly Newsletters Including The Artificial Intelligence and Big Data Weekly

MichaelTanji

About MichaelTanji

Michael is a former soldier and intelligence officer who at one point managed the DIWS for cyber threat. He has spent most of the last decade starting and running various cybersecurity start-ups.

Reader Interactions

Leave a Reply Cancel reply

Primary Sidebar

Cybersecurity Context

Global Cyber Alliance Release: Perhaps the most important of the 2018 RSA Conference Season

Fingbox: Giving you something you need now more than ever, awareness and control over your home network

Secure Enclaves: Foundation For The Cloud-Based Enterprise

Cognilytica’s Weekly Newsletter on AI and Related Topics

The Cloud Security Alliance Hosts 5th Annual Federal Summit on 15 May 2018

Time for Transformational Cybersecurity Part II

Looking for Blockchain Innovation During RSA 2018

Steps to Take to Beat the Insider Threat in 2018

Six Methods to Create a Secure Password You’ll Actually Remember [INFOGRAPHIC]

Seasoned IT Professional and Security Rookie On Building Appropriate Influence

Maximize The Value Of Your 2018 RSA Show Visit

Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases

Main Street Cybersecurity: Can Email Be Safe?

InfoWarCon18 Is Coming! Nov 1-3 Leesburg VA

5 Examples of the Best Workplace Tech Available in 2018

Time for Transformational Cybersecurity!

More Thoughts from a Seasoned IT Professional and Security Rookie

DataTribe Launches Inaugural Cyber Funding Competition: The DataTribe Cyber Crucible (putting up $Millions in funding)

How Taking the Time to Verify Your Network Could Save You Millions

Thoughts from a seasoned IT professional and security rookie

CyberWar And You:

Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

In Defense Of 3% Of Google’s Employees And Their (And Everyone’s) Right To Have Opinions

Energy Pipeline Operations Affected By Cyberattack

White House Takes Action Against Chinese Intellectual Property Theft

The Ethics Of AI and Big Data: Facebook and Cambridge Analytica Are Writing New Case Studies For Us All

Internet-connected Product Bans: How Do You Avoid Future Issues?

3 Software Programs That Let Businesses Monitor Employees’ Computers

The Cyber Threat Provides New Insights Into Bad Actors: Book updated with latest on threat actors and the tech ecosystem

2018 Goal: Re-position Cybersecurity As An Enabler

Connected Vehicles and Cybersecurity: An SAE produced webinar

FBI Deputy Director On Russian Election Influence Ops: “We should have seen this coming”

SINET 16 Innovator Winners: Every year this list highlights firms every enterprise tech professional should track

A Fierce Domain: Conflict in Cyberspace

Four Common Password Practices You Might Want To Reconsider

 FBI vs Apple: Informed Dialog on Privacy vs Security Is Key

How to Keep Your Company’s Information Organized

FBI vs Apple: Lessons From History and The Law on Protecting Privacy Rights

Are you ready for state-sponsored zombie malware attacks?

FBI vs Apple: Policy Analysis

Leveraging Social Media to Expand Business Data Globally

What You Get With CTOvision Pro

Joining CTOvision Pro provides you with unlimited access to our in depth market research, technology trends analysis, company reviews and special reports.

  • If you are from the technology community you will gain insights into your market and enterprise mission needs.
  • Enterprise architects, program managers and acquisition professionals gain insights into the rapidly shifting technology landscape.

Try CTOvision Pro today!

Connect with:

Membership Login



signup now | forgot password?

Crucial Point LLC technology due diligence

Disruptive IT finder

CTOevents

CTOvision Mobile

CTOvision Newsletterss

Hottest Content of Last Two Days

  • Global Cyber Alliance Release: Perhaps the most important of the 2018 RSA Conference Season
    Global Cyber Alliance Release: Perhaps the most important of the 2018 RSA Conference Season
  • Craxel's Digital Trust Platform, Data Security and Your Identity
    Craxel's Digital Trust Platform, Data Security and Your Identity
  • The Internet of Things: Explained
    The Internet of Things: Explained
  • Fingbox: Giving you something you need now more than ever, awareness and control over your home network
    Fingbox: Giving you something you need now more than ever, awareness and control over your home network
  • Cyber War: The Fastest Way to Improve Cybersecurity?
    Cyber War: The Fastest Way to Improve Cybersecurity?
  • Robots Keep Evolving: New Capabilities of Boston Dynamics Robotic Dog Are Amazing
    Robots Keep Evolving: New Capabilities of Boston Dynamics Robotic Dog Are Amazing

Footer

Free Newsletters and Tech Reports
CTOVision Pro: Exclusive Content

CTOs on Facebook
CTOs on LinkedIn

CTO Events
CTOvision Mobile App

Copyright © 2018 CTOvision.com ·