Main-Normal Jonathan Shaw’s experience in cybersecurity and defence technique has formed the way forward for nationwide safety. The cybersecurity keynote speaker was the primary Head of the Defence Cyber Safety Programme on the UK Ministry of Defence, pioneering fashionable cyber defence initiatives. We spoke to Jonathan to discover how organisations can strengthen their cybersecurity, navigate evolving threats, and construct resilience in an period of digital warfare.
Because the Head of the Defence Cybersecurity Programme on the Ministry of Defence, you navigated a subject that’s each extremely technical and conceptually advanced. What was your proudest achievement on this function?

I feel it was transitioning from somebody who knew nothing about cyber to somebody who may communicate knowledgeably concerning the conceptual aspect of cybersecurity. Cyber clearly has a deeply technical facet, however what I shortly discovered was that the technical particulars weren’t as necessary because the broader implications – how cyber expertise impacts all our lives.
My biggest achievement was creating the flexibility to elucidate a digital topic in an analogue manner, making it significant to those that didn’t perceive it. That, I imagine, was my most vital accomplishment.
Management in cybersecurity requires a special method because of the disruptive nature of expertise. In your expertise, what does efficient management in cybersecurity seem like, and the way ought to it evolve to deal with the challenges posed by this quickly altering subject?
Cyber is basically disruptive. It considerations data, and consequently, it disrupts the normal hierarchy of information. Organisations are often structured in a manner that ensures senior leaders obtain data first, however within the cyber world, that’s not the case.
Many senior leaders I encountered had been what I name ‘cyber vacationers’ – that they had some consciousness however lacked actual experience. This implies management should change as a result of you’ll be able to now not look ahead to prime executives to completely perceive the difficulty earlier than taking motion. As a substitute, management should empower, practice, and belief people on the coalface, who typically have a far better understanding of cybersecurity threats.
This requires transferring away from a inflexible, top-down command construction to a extra decentralised method. Within the navy, we name this ‘mission command’ reasonably than ‘directive command’. It permits for sooner decision-making and a extra agile response to threats.
Organisations face an ever-growing menace of cybercrime. What are the highest three sensible steps they will take to guard themselves and construct resilience towards cyberattacks?
When discussing safety, most individuals give attention to shields and blocking mechanisms, however a navy analogy will be helpful right here. In defending a automobile towards assault, there are a number of layers of defence, and solely one among them is a bodily defend. The primary and most vital step is to keep away from being noticed – keep invisible.
Assume our on-line world is inherently insecure and act accordingly. If you happen to make your self extremely seen on-line, you enhance your possibilities of turning into a goal. Whereas this conflicts with promoting wants, organisations should discover a steadiness. Individuals additionally must cease buying and selling their privateness for comfort, which is one thing many people have been responsible of.
The second step is to simply accept that you can be hacked in some unspecified time in the future. The extra profitable you might be, the extra possible you might be to be attacked. Due to this fact, preparation is essential. Construct resilience, set up redundancy, and practice your crew to reply successfully to a breach.
The third step is to make sure that your whole provide chain follows strict cybersecurity protocols. It isn’t nearly your organisation; vulnerabilities typically come via third-party distributors. Cyber hygiene should prolong past your individual techniques to these of your companions. In abstract: minimise your publicity, put together for an assault, and guarantee your provide chain maintains excessive cybersecurity requirements.
Cyberattacks on nationwide infrastructure have the potential to disrupt society on a big scale. To what extent can a nationwide cyberattack affect our day by day lives?
You don’t must look far for an instance of this. Essentially the most dramatic case was in 2007 when Russia took offence on the Estonian Authorities’s determination to maneuver a statue of the Bronze Soldier from the centre of Tallinn to a graveyard.
As retaliation, Russia launched a large cyberattack that successfully shut down Estonia. They disabled banking techniques, authorities operations, and media channels, rendering the nation unable to perform correctly for weeks, even months.
Curiously, this assault pressured Estonia to turn out to be a world chief in cybersecurity. In response, they arrange a nationwide cyber defence unit, recognising that cybersecurity is a collective duty. Their method is now thought-about greatest apply in Europe, if not the world.
This case highlights each the severity of cyberattacks and the significance of nationwide preparedness. A serious cyberattack can cripple important companies, disrupt communication, and have lasting financial penalties. It’s a reminder that cybersecurity isn’t just a authorities challenge – it impacts everybody.
With expertise evolving quickly, what do you expect would be the subsequent main sort of cyberattack, and what rising dangers ought to we concentrate on?
Our on-line world is inherently insecure. The truth is, the Russians beforehand hacked into the NSA’s database and found backdoors that had been intentionally constructed into varied techniques. Now, they’ve an inventory of vulnerabilities they will exploit. The SolarWinds assault was only one instance of this, and we must always count on extra of those assaults sooner or later.
One other speedy concern is the misplaced perception in blockchain expertise as a flawless safety resolution. Many individuals see it as a panacea, however it’s not. Blockchain has backdoors, has been hacked earlier than, and incorporates zero-day vulnerabilities. The idea that blockchain mechanically makes our on-line world safe is solely incorrect.
In the long term, I see this as a cultural challenge reasonably than only a cybersecurity concern. We’re transitioning from what some name ‘United States digital colonialism’ – the place the US managed the event of digital expertise based mostly on Western values – to ‘Chinese language digital colonialism’. The Pentagon’s former head of cybersecurity lately acknowledged that the West has already misplaced the bogus intelligence battle and that China will dominate the way forward for AI.
This shift will basically change the assumptions on which software program is developed. As AI turns into extra prevalent, we might want to navigate an period the place software program and cybersecurity frameworks are formed by completely different cultural and strategic pursuits.
How possible is a profitable cyberattack on nationwide infrastructure, and what components affect the chance of such an occasion?
If attackers discover a vulnerability, they’ll exploit it. The query just isn’t whether or not a nationwide cyberattack is possible- it’s about how effectively we are able to mitigate the injury.
The excellent news is that main states keep away from direct cyber warfare because of the doctrine of mutually assured destruction. If China may take down Britain, Britain may possible retaliate in type. Neither nation has an incentive to launch a full-scale cyberattack as a result of the implications could be catastrophic for each side.
The unhealthy information is that legal organisations function as proxies for state actors. These non-state teams don’t have any infrastructure that may be focused in retaliation, making them a better menace. Some argue that these teams are not directly managed by states, and that could be true.
Nevertheless, as a result of cybercriminals should function from bodily places, they will nonetheless be pressured. These teams are usually not working from outer area – they’re based mostly in Russia, China, Bulgaria, or elsewhere. Governments can and will use diplomatic and financial measures to disrupt their actions.
Whereas the web creates an enormous assault floor, it’s nonetheless attainable to impose real-world penalties on cybercriminals. Ultimately, if an assault is deliberate, it’ll possible succeed to some extent, which is why preparation and mitigation methods are so necessary.
If you happen to may give your youthful self one piece of recommendation, what would it not be?
Nothing to do with cybersecurity, actually. It will be to take alternatives and have extra confidence in myself. Trying again, my greatest regrets are usually not the issues I did, however the doorways I didn’t open. Simply having extra confidence and going for issues would have made a giant distinction.
Life isn’t a rehearsal – it’s important to take management and benefit from it as a result of time strikes shortly. I’m 63 now, and whereas I’ve carried out some nice issues, I do know I may have carried out much more. Now could be at all times the time to grab alternatives.
Picture by Free stock photos from www.rupixen.com from Pixabay, and Champions Speakers.
This interview with Jonathan Shaw was carried out by Mark Matthews.
Wish to be taught extra about cybersecurity and the cloud from trade leaders? Take a look at Cyber Security & Cloud Expo happening in Amsterdam, California, and London.
Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.
