The Kill Chain: Future of Cyber in Defense

By Harshit Agrawal on 13 Oct 2021 @ Rootcon
📹 Video 🔗 Link
#architecture #ics-security #risk-management
Focus Areas: ⚖️ Governance, Risk & Compliance , 🏭 Industrial Control Systems Security , 🏗️ Security Architecture

Presentation Material

Abstract

Modern military forces rely heavily on a variety of complex, high technology, electronic offensive, and defensive capabilities. A well-timed Tweet, an errant Facebook group, or a seemingly harmless WhatsApp forward holds the potency to be even more dangerous than artillery fire and airstrikes. This session aims to reflect the opportunity for attendees to learn about emerging technologies, threats, and practices that will shape the future of warfare and cyberspace operations.

The main topics are Information Warfare, Cyber Reconnaissance, Internet of Battlefield Things. This session will introduce attendees to the Era of Convergence of Cyber and EW, Operations in Multi-domain, along with case studies of Cyber-Reconnaissance, C-UAS, Space warfare, and a glimpse of future warfare from a technological perspective (IoBT).

AI Generated Summary

The talk addresses the convergence of cyber and electronic warfare in modern military operations, emphasizing the critical role of information technology and the Internet of Things (IoT) as both enablers and vulnerabilities. It argues that digital technology has transformed the battlefield, making forces and civilian infrastructure highly dependent on interconnected, networked systems.

Key findings highlight the IoT as a significant attack surface. Consumer and industrial IoT devices, often with weak security, can be weaponized to create botnets, conduct surveillance, or disrupt critical services. The integration of cyber and electromagnetic spectrum operations is presented as a fundamental shift, where electronic warfare (jamming, spoofing) and cyber attacks (malware, data manipulation) are combined to achieve effects across physical and digital domains. The talk details how this “cyber-electronic” approach can degrade an adversary’s command and control, sensor networks, and logistics by targeting the underlying hardware and software of connected systems.

Practical implications stress the necessity for robust security in device design, supply chain integrity, and network architecture. Defending modern forces requires securing the entire IoT ecosystem—from sensors and smartphones to industrial control systems—and developing integrated strategies that address both cyber intrusions and electromagnetic interference. The talk concludes that future conflicts will be dominated by the battle for information dominance, where controlling the electromagnetic spectrum and securing data flows are as vital as traditional kinetic capabilities. The vulnerability of critical infrastructure like power grids and communication networks to hybrid cyber-electronic attacks is identified as a primary national security concern.

Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview — always refer to the original talk for authoritative content. Learn more about our AI experiments.