
Russian Invasion: How to Evaluate Your Organization's Cyber Risk
Cybersecurity Implications of the Russian Invasion of Ukraine
Russian government threat actors are effectively military assets. As such, they are currently extremely busy targeting organizations that can provide intelligence on NATO intentions/reactions, UN intentions/reactions, and regional players such as Romania, Georgia, Poland, etc. Because these operators are a finite resource, they likely will not be motivated to prioritize destructive cyberattacks against US/EU organizations and infrastructure. This would likely change if the US or EU commit ground troops or air support.
Evaluating Your Organization's Risk Posture
- Will attacking this target cause disruption, ultimately undermining public support for actions against Russia?
- Will this attack be seen as an act of war by the victim? Note that Russia wants to avoid bringing US/EU into a shooting war.
- Does the attack burn cyber accesses or capabilities that cannot be easily replaced?
- Attacking this target limits future intelligence collection against the target. Is the intelligence gained significant? If so, destructive attacks are far less likely.
- Is this a target Russia will want to conduct destructive operations against if the US or EU escalates? If so, they likely won’t attack now since the accesses required will be hard to replace quickly.
This piece is a sampling from our Live Executive Communications Briefing led by IANS Faculty member Jake Williams on Friday, February 25 at 9am EST. These briefings are held following significant security events to provide our clients with the latest news and guidance on major incidents.
Get in Touch to Learn More