S4x23 Review Part 1: What’s New in OT Security

In this blog, I will introduce discussions from S4 over several posts. The first installment will cover two topics from the academic interviews.

Interview with Michael Fischerkeller – Author of Cyber Persistence Theory

Fischerkeller is a senior researcher in the Institute for Defense Analyses and has been involved in shaping US government security policy for over 25 years. Based on this experience, he published “Cyber Persistence Theory” with two co-authors, aiming to bridge the gap between cyber security theory and policy. Dale interviewed him based on this work.

During the upon reading his book entitled “Cyber Persistence Theory” and attending the talk, I found that:

Cyberspace is a completely different third strategic environment from traditional strategic environments. Adversaries are constantly in contact with each other due to interconnectivity. Countries exploit their adversaries’ vulnerabilities for their own benefit. The cumulative effect can exceed the benefits of traditional warfare.

As a symbolic term to explain the characteristics of cyberspace, Fischerkeller mentioned the difference between “exploitation” and “coercion”.

Coercion and exploitation are two different concepts in the context of national security. Coercion is a strategy that involves the use of threats or force to compel another state to change its behavior or comply with certain demands. For example, a state might threaten military action or economic sanctions in order to coerce another state into stopping its nuclear program or withdrawing from a disputed territory. Coercion is often used as

Read more

Explore the site

More from the blog

Latest News