
DATA SECURITY DECODED
Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance
In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.
What You'll Learn:
Why Chinese cyber operations are fragmented and decentralized, and why that matters for defenders
How private companies in China are tied to the Communist Party and mobilized for cyber objectives
The strategic difference between China, Russia, North Korea, and Iran in their cyber operations
How China’s targeting priorities have shifted toward telecom, energy, water, and transport infrastructure
Three intelligence-driven approaches defenders can use to counter Chinese operations
What the 14th Five-Year Plan achieved in cyberspace, and what to expect in the 15th
Episode Highlights:
- The fragmented reality of Chinese state-backed cyber operations
- How cultural and political structures shape threat actor behavior
- Comparing China’s cyber strategy to Russia, North Korea, and Iran
- Why telecom, energy, and water systems are top targets
- China’s 14th Five-Year Plan successes and projections for the 15th
SERIES
Explore other episodes
NEWSLETTER
Get insights straight to your inbox