Skip to content

Asserting Dominance in the Digital Realm: Zero Trust and Perpetuity in Cyber Security

Irregular Warfare Podcast's 72nd episode marks the start of the Project Cyber under the Irregular Warfare Initiative. These projects delve into pressing issues affecting contemporary irregular warfare practices, policies, and academics. Experts guide each project, fostering diverse discussions,...

Asserting Control in the Digital Sphere: Zero Trust Strategies and Enduring Presence in Cyber...
Asserting Control in the Digital Sphere: Zero Trust Strategies and Enduring Presence in Cyber Operations

Asserting Dominance in the Digital Realm: Zero Trust and Perpetuity in Cyber Security

The Irregular Warfare Podcast, a production of the Irregular Warfare Initiative, recently released Episode 72, titled the Irregular Warfare Initiative Project Cyber. Hosts Laura Jones and Maggie Smith led a thought-provoking discussion with guests David McKeown, Richard J. Harknett, and Maggie Smith on the topics of zero trust and persistence theory within the cyber domain.

The conversation centred around how these concepts are redefining cyber defense and offensive strategies. Zero trust, as explained by the guests, is a paradigm shift in cybersecurity that no longer assumes internal network trustworthiness. Instead, it demands continuous verification of all access requests, devices, and users, regardless of their location within or outside traditional perimeters. This model significantly reduces attack surfaces and mitigates lateral movement by adversaries.

Persistence theory, on the other hand, underscores the tactics employed by threat actors to maintain long-term unauthorized footholds within networks. These tactics often involve sophisticated stealth techniques and the leveraging of supply chains or insider compromise. Persistence complicates detection and eradication efforts, necessitating persistent monitoring and deceptive countermeasures.

The guests also discussed the implications of integrating zero trust principles with enhanced persistence detection capabilities. They emphasised the need for greater cross-domain intelligence sharing and coordination across military, intelligence, and civilian cyber defense stakeholders. Adoption of automated and adaptive defenses leveraging AI to detect anomalies suggestive of persistent threats was also highlighted.

The conversation underscored the need for a paradigm shift from reactive incident response to proactive posture management, including deception technologies and continuous red teaming exercises. Incorporating zero trust into strategic policy and doctrine was seen as essential to ensure cyber forces anticipate adversary persistence and leverage layered defenses to protect critical infrastructure.

The Irregular Warfare Initiative, a team of volunteers, generates written and audio content, and hosts events for the IW community. They also host critical thinkers in the field of irregular warfare as IWI fellows. Subscribing to their monthly newsletter grants access to written content, upcoming community events, and other resources.

Image credit for the article is from Fort George G. Meade Public Affairs Office. The Irregular Warfare Podcast can be followed and engaged on Facebook, Twitter, Instagram, YouTube, or LinkedIn.

Dr. Richard J. Harknett is professor and director of the School of Public and International Affairs and chair of the Center for Cyber Strategy and Policy at the University of Cincinnati. He is coauthor of the book Cyber Persistence Theory: Redefining National Security in Cyberspace and codirects the Ohio Cyber Range Institute. Dr. Harknett has served as scholar-in-residence at US Cyber Command and the National Security Agency.

Maggie Smith, the director of IWI Project Cyber, is also a cohost for the episode. She has over thirty-five years of experience in the Department of Defense. Mr. David McKeown serves as the acting DoD principal deputy chief information officer and in the dual role of deputy DoD chief information officer for cybersecurity and DoD senior information security officer.

This discussion provides a nuanced understanding of how the cyber domain's unique challenges—especially around trust assumptions and persistent threats—influence the evolution of U.S. and allied cyber strategy and operational approaches. The episode serves as both a conceptual and practical guide to navigating the complex cyber battlespace today and in the future.

  1. The Irregular Warfare Podcast discussion on zero trust and persistence theory in the cyber domain highlights the need for a paradigm shift in cyber defense and offensive strategies.
  2. Zero trust, as explained, is a shift in cybersecurity that demands continuous verification of all access requests, devices, and users, reducing attack surfaces and mitigating adversary movement.
  3. Persistence theory, on the other hand, focuses on threat actors' tactics to maintain long-term unauthorized footholds within networks, complicating detection and eradication efforts.
  4. Integrating zero trust principles with enhanced persistence detection capabilities is crucial, according to the guests, requiring greater intelligence sharing, cross-domain coordination, and AI-driven defenses.

Read also:

    Latest