CyAN is proud to announce our role as a Community Partner for the following prominent global cybersecurity and technology events. Mark your calendars! Supply Chain Cyber Security Summit (SCCS) 9–11 April 2025 | Lisbon, Portugal CyAN board member Bharat Raigangar will be speaking at this …
Information Security News US Weakens Disinformation Defenses, as Russia & China Ramp Up Dark Reading by Robert LemosAs geopolitical tensions escalate, the US has notably reduced its efforts to combat disinformation, especially from key adversaries like Russia and China. This rollback occurs despite increasing efforts …
Gate 15‘s Andy Jabbour joins us on this episode of CyAN’s Secure-in-Mind series, as we discuss a wide variety of topics. We cover information and intelligence sharing, geopolitics, US and European cybersecurity capabilities, information security investment, collective cyberdefence, adversaries, threats, and some nifty travel tips.
Notes and Links:
As always, we haven’t read all of these in their entirety, and the Wikipedia links are provided as-is, and only meant as a starting point for someone interested in more than just casual information.
You can find CyAN’s Secure-in-Mind YouTube channel at https://youtube.com/@cybersecadvisors. All of our episodes are also available in audio format on Apple iTunes, Amazon Audible, Podcast Republic, Spotify, and Libsyn – links on our Media page.
Information Security News Judge blocks Elon Musk’s Doge from accessing social security records The Guardian by Guardian Staff & AgenciesA federal judge has issued a restraining order preventing Elon Musk’s Department of Government Efficiency (Doge) from accessing Social Security Administration (SSA) records, citing privacy concerns …
The European Union’s Digital Markets Act (DMA) is setting the stage for significant changes in the tech landscape, particularly for companies like Apple, known for their tightly controlled ecosystems. While the DMA aims to enhance competition and consumer choice by opening up platforms like iOS …
This is the second episode of a story related to individuals who, in a matter of moments, transition from “employees” to “rescuers” in the immediate aftermath of a destructive cyberattack.
What I will call the “Heroes”
Which role within a company can become a Hero? And why?
“The fact is, you have to do things before and after. You have to pay attention to people’s sensibilities. Even if we’re in a period of crisis, we mustn’t just have financial objectives, catering objectives or customer recovery objectives. We have to think about the well-being of the teams, to keep as many staff as. There’s a point in getting the business back on its feet if everyone leaves after the crisis.”
Excerpt From the Interview
During the genesis of my book, I have analysed cases where I interviewed people who had been involved in a major corporate cyberattack. I have identified four categories of individuals who are likely to become heroes. I would remind you that being a hero is not necessarily an enviable position. I will now discuss the journeys of these individuals, highlighting the effects on their personal and professional lives.
The Director
Directors are often forgotten, but they are among the positions most affected by cyberattacks. This is because they cannot shirk their responsibilities: it is up to them to allocate the budget, define priorities and create the corporate culture. Furthermore, recent European directives and regulations, such as NIS2 and DORA, insistently remind directors of the fundamentals already described in ISO 27,001. Management’s role is crucial in cybersecurity. They can no longer hide behind the ‘It’s an IT problem’ excuse.
I observed two diametrically opposed attitudes.
A Hero.
One was a director who was not only personally involved in crisis management, but also felt emotionally committed to and in solidarity with his teams. This person was like a captain of a ship ready to go down with their vessel, with their sole concern being the well-being of their crew and the survival of the company. Unlike the second profile, he does not seek to justify himself or to protect himself. Therefore, this individual will experience personal effects during the crisis, including stress, anxiety, and a sense of guilt. Unfortunately, he is likely to struggle to accept, rightly or wrongly, the impact of the cyberattack. As a result, he will resign after everything is back in order. He will leave with a feeling that he was taken advantage of. These events will mark him for the rest of his career.
NOT a Hero.
In contrast, there is a director who knows that they are partly or fully responsible for making bad choices. They will primarily focus on protecting themselves from the consequences, both for their job and their career. During the crisis, they will try to justify their past decisions. Unfortunately, this type of individual will remain in the office even after the crisis. You will easily identify them, as they will be rewriting history on a grand scale.
The IT Manager
A Hero.
This one will endure pain, as they will be both the tool and the object of it. Based on the cases studied, his main concern is being able to take his rightful place. If he goes into crisis management mode, he will probably fall into the trap that crisis communication is almost always destructive. He will also be part of the rescue team, but he will be more or less involved in strategic decisions. There are cases where management will potentially dismiss him and consider him as a mere executor. This is contradictory, since he can contribute the most to decision-making. After the crisis, there will be very mixed feelings. On the one hand, the feeling of not having been considered at his true value, and the fact that he is in management and does not receive the same congratulations as the technical people. And, on the other hand, that he was left with the dirty work. The result is very often great frustration, leading to resignation or burnout. This is damaging for society, because he would be very useful for the post-crisis and reconstruction phase.
The CISO
A Hero.
This one is going to suffer. Because he is going to be both the hammer and the anvil. Based on the cases studied, his main concern is going to be his ability to take his rightful place. If he goes into crisis management mode, he will probably fall into the trap that crisis communication is almost always destructive. He will also be part of the rescue team, but he will be more or less involved in strategic decisions. There are cases where management will potentially dismiss him and consider him as a mere executor. This is contradictory because he is the one who can contribute the most in terms of decision-making. This will result in very mixed feelings after the crisis. On the one hand, the impression of not having been considered at his true value, and the fact that he is in management and does not receive the same congratulations as the technical people. And, on the other hand, that he was left with the dirty work. The result is very often great frustration, leading to resignation or burnout. This is damaging for society, because he would be very useful for the post-crisis and reconstruction phase.
The IT Engineer or Security Engineer
A Hero.
We immediately think of him as the hero. He will work day and night, 24 hours a day. He will forget about his family life. He will not be able to tell them everything, which will have harmful effects. Right after the shock, he will participate in the rescue of society. However, he will face significant disappointment, especially if crisis management is not properly coordinated. They will face harsh consequences due to sudden shifts in direction and constant changes. In addition, he will suffer the double kiss cool effect. His unwavering commitment will increase, but he will also be perceived as a possible perpetrator. The external consultant will also scrutinize their technical skills. It will be simple for the external consultant to identify what was done incorrectly before the crisis. I have observed in these individuals that the stress and anxiety caused by the crisis often transform into a kind of trauma. The consequences are professional burnout, recurring nightmares, and sometimes physical health issues. More than half of those surveyed either experienced burnout or left their jobs within six months of the crisis.
Stay tuned for the next episode.
And don’t forget: “Treat cybersecurity like personal hygiene—if you ignore it, sooner or later, things are going to get really messy and start to stink!”
About the Author
Didier Annet is an Operational & Data Resilience Specialist and a Certified Professional Coach dedicated to empowering individuals and teams to navigate the complexities of an ever-changing digital landscape.
Learn more in his book: Guide de survie aux cyberattaques en entreprise et à leurs conséquences psychologiques: Que fait-on des Héros ? (French Edition) – Available on Amazon
Coming soon: The English version – “What Happens to Heroes”
Agentic AI is when autonomous AI agents make decisions and execute tasks. It’s poised to revolutionize industries. But with this power comes new cybersecurity challenges. This blog explores the deployment architectures of agentic AI solutions and identifies key attack vectors, offering a glimpse into innovative …
Information Security News Microsoft: New RAT Malware Used for Crypto Theft, Reconnaissance BleepingComputer by Sergiu GatlanMicrosoft has identified a new form of RAT (Remote Access Trojan) malware that is being used for cryptocurrency theft and detailed reconnaissance of infected systems. This sophisticated malware targets digital …
Inspired by recent movements in Europe, where tech giants like Airbus have advocated for a sovereign fund to support local technology sectors, this article explores Australia’s strategic need to develop sovereign satellite communication systems. As digital connectivity becomes increasingly crucial, the time to fortify our independence and security is now.
The Strategic Need for Sovereign Capabilities
Historical precedents and contemporary movements highlight the risks of depending on foreign technology. The initiative by European tech firms to establish a sovereign fund to support their local industries serves as a compelling example of proactive steps taken to safeguard regional interests and reduce dependency on non-European technologies.
Similarly, developing sovereign satellite communication systems ensures that Australia retains control over its digital destiny, preventing any entity from having disproportionate power over our national infrastructure.
Economic and Cybersecurity Advantages
Investing in sovereign satellite systems not only secures national security but also stimulates economic growth. This initiative would create high-skilled jobs, encourage local research and development, and lead to the creation of new technologies.
Enhanced cybersecurity measures within these systems mean that Australia can implement robust security protocols and respond more swiftly to cyber threats, safeguarding the integrity and privacy of information.
What Happens If the Cord Is Cut?
The scenario where international tensions lead to a sudden ‘cut-off’ of satellite services managed by foreign corporations could particularly cripple Australian businesses in less wired areas. While most of Australia’s internet traffic is transmitted via fibre optic cables, which predominantly cover urban areas, satellite communications are crucial for ensuring connectivity in rural and remote regions.
Disruptions in these satellite services could lead to significant communication and transaction challenges in these less connected areas. Moreover, if these fibre optic cables were to be cut—whether through sabotage or other disruptions—the effects could be catastrophic, spreading even to major cities.
Such a scenario would not only lead to significant economic losses but also destabilise the entire business landscape, underscoring the critical need for robust and diversified communication infrastructure.
Policy Recommendations and Economic Incentives
Taking cues from the European call for a sovereign fund, Australia could explore similar financial structures to support the development of its satellite technologies.
Government initiatives might include grants for R&D, tax incentives for local production, and educational programs to nurture expertise in satellite technology and cybersecurity.
Learning from Global Counterparts
The success stories of countries like Canada and France in developing their satellite capabilities offer valuable lessons. These nations have balanced public-private partnerships and regulatory frameworks to encourage innovation while protecting national interests—approaches that could be adapted to benefit Australia.
In Canada, companies like MDA (MacDonald, Dettwiler and Associates) and Telesat have been instrumental in advancing satellite communication technologies. MDA has developed critical infrastructure such as the RADARSAT series, while Telesat operates a fleet of satellites that enhance broadband connectivity and mobile communications across vast distances.
France’s strategy includes significant contributions from firms like Thales Alenia Space, which designs and builds satellites for a variety of functions including telecommunications and Earth observation. Airbus Defence and Space plays a crucial role in the manufacture of advanced satellite systems for both military and commercial uses. Additionally, Eutelsat, as the owner of the London-based OneWeb, exemplifies the strategic importance of maintaining control over satellite communications to ensure national sovereignty.
These examples underscore the benefits of nurturing domestic industries and maintaining control over critical communications infrastructure, providing a roadmap for Australia to enhance its digital sovereignty and secure its satellite communication capabilities.
Cybersecurity at the Core
Designing sovereign satellite systems with cybersecurity at their core ensures resilience against evolving cyber threats. This proactive approach not only protects Australia’s data but also strengthens global confidence in our digital infrastructure.
Conclusion
The necessity for sovereign satellite communication capabilities extends far beyond the realm of technology—it is a strategic imperative vital for ensuring Australia’s long-term security, autonomy, and economic prosperity. As we observe our European counterparts taking decisive steps by advocating for sovereign funds to bolster local tech industries, it becomes clear that Australia must also take bold action.
We must not only support but actively invest in developing and securing our satellite communication infrastructure. This commitment should manifest in increased government funding for space technology research and development, incentives for businesses investing in this sector, and the establishment of robust policies that prioritize national over foreign interests in critical communications infrastructure.
Let us unite—policymakers, industry leaders, and the technology community—to forge a path toward digital independence. By doing so, we will secure a future where Australia remains resilient and competitive in the global digital economy. It’s time for decisive action to protect and advance our national interests. Let’s champion the creation of a sovereign and secure digital landscape for generations to come.
About the Author:
Kim Chandler McDonald is the Co-Founder and CEO of 3 Steps Data, driving data/digital governance solutions. She is the Global VP of CyAN, an award-winning author, storyteller, and advocate for cybersecurity, digital sovereignty, compliance, governance, and end-user empowerment.
Information Security News Elon Musk’s Starlink Could Be Used to Transmit Australian Election Voting Results The Guardian by Josh TaylorThe Guardian reports that Elon Musk’s satellite internet service, Starlink, is being considered as a potential method to transmit voting results in Australian elections. This proposal …