The New Battleground – Cyberterrorism

The Then and Now of Conflict

Mankind is no stranger to conflict, in fact conflict has played a pivotal role in creating the world we live in today.  However, the conflicts we face today have changed greatly from those of the past.  To understand where we are, it is important to understand where we came from and how “threats” have evolved.


Throughout the history of civilization there have been conflicts or wars between two factions.  Typically, these wars were based on the pursuit of land expansion.  From the Roman Empire, British Empire, & Germany with WW1 and WW2 the focus was conquering of foreign lands as a nation’s wealth and strength was based on the amount of lands and resources they controlled.

The battleground has changed drastically.  A country’s strength is no longer based on the amount of land they control.  Instead the new measure of wealth and strength is based on their economy and foreign trade.  With this shift, countries have implemented technology to create efficiencies and to expand their offerings to people whether they are based in a major city or a small rural town.  This adoption has obviously had a tremendous positive impact on everyday lives.  However, with the adoption of modern technology in every facet of people’s lives it allows military strategists, bad actors and cyber terrorists an entirely new avenue to attack and complete their objectives.

Potential Attacks Amp Up

Due to the conflict with Iran and North Korea the fear of the new form of war known as Cyberterrorism has never been higher. The definition of Cyberterrorism says, “the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society”.  The disruption can be caused on many factors such as Ransomware, disruption of services (such as power grid), or even compromising election voting devices.

One of the major differences between Cyberterrorism and traditional land-based warfare are the targets.  Cyberterrorism doesn’t necessarily focus purely on Government agencies.  In fact, in reviewing the definition, “causing severe disruption or widespread fear in society”, organizations must realize that they are now part of this new battleground as they impact a great deal of everyday life.

So How Can We Combat Cyberterrorism? 

Like all military engagements, training and strategy are keys to success.  We, as organizations, need real life “war games” to prepare for potential attacks.  This is where the Red Team exercises and engagements come into play. Red Team Engagements are essentially a bootcamp for organizations to evaluate how prepared they are for potential attacks.  Red Team Engagements simulate what a Cyberterrorism attack would look like within that organization or entity.  By simulating a cyber-attack,
organizations can evaluate their tools, people, and policies
to ensure they are prepared for a potential invasion of their
intellectual property and data.

Find out where your organization’s gaps and vulnerabilities are and make a plan to shore up your security posture.

Schedule your Red Team Engagement today.