Cybercrime , Cyberwarfare / Nation-State Attacks , Events

Cyberwarfare Strategy and How It Applies to Businesses

Chase Cunningham of Ericom on the Need to Appreciate the Adversaries' Perspectives
Chase Cunningham, CSO, Ericom Software

Cyberwarfare has emerged as the bridge between espionage and kinetic conflict. "It's here," says Chase Cunningham of Ericom Software. He discusses how enterprise cybersecurity leaders should now think more deeply about their adversaries' motivations and capabilities.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

In a video interview with Information Security Media Group at RSA Conference 2022, Cunningham also discusses:

  • Technology's evolution;
  • Perfect vs. realistic security;
  • How small to midsize organizations can still enjoy enterprise-level defenses.

Prior to Forrester Research, Cunningham was the director of cyberthreat intelligence with Armor, where he designed and managed the cloud security and intelligence engine for its enterprise customers. A retired U.S. Navy chief with more than 20 years of experience in cyberforensic and cyberanalytic operations, he has past operations experience, stemming from time spent in work centers within the NSA, CIA, FBI and other government agencies. In those roles, he helped clients operationalize security controls, install and leverage encryption and analytic systems, and grow and optimize their security operations command systems and centers.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.