Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Video

The Use of Cyber Power in Conflict

Miriam Howe of BAE Systems Discusses Cyber Power in a Military Context
Miriam Howe, lead cyber consultant, BAE Systems

Cyberspace is a battlefield with no physical or geographic boundaries. During wartime, targets on land, sea, air and space are vulnerable to cyberthreats and opportunities, and nations face many uncertainties about when and how to respond to attacks, says BAE Systems' Miriam Howe.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

Most cyber activity goes on below the threshold for war, with legal, political and diplomatic considerations as part of any decision about how to respond, but there's little evidence to show that cyberattacks are escalating into kinetic action, Howe says.

In this video interview with Information Security Media Group, Howe discusses:

  • The threshold for offensive cyber activity to provoke a physical response;
  • Why public attribution can affect an attacker;
  • How the military strategy of multi-domain integration applies to cyber power.

Howe leads international cyber capacity-building projects at BAE Systems, working with other nations that are building their sovereign cyber capabilities as well as supporting the U.K. government's cyber capabilities program. She previously worked for the National Policing Improvement Agency, Vega Consulting Solutions and BT.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.