image

DATA SECURITY DECODED

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance

 

In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.



  • What You'll Learn:

    • Why Chinese cyber operations are fragmented and decentralized, and why that matters for defenders

    • How private companies in China are tied to the Communist Party and mobilized for cyber objectives

    • The strategic difference between China, Russia, North Korea, and Iran in their cyber operations

    • How China’s targeting priorities have shifted toward telecom, energy, water, and transport infrastructure

    • Three intelligence-driven approaches defenders can use to counter Chinese operations

    • What the 14th Five-Year Plan achieved in cyberspace, and what to expect in the 15th

       

  • Episode Highlights:

  • The fragmented reality of Chinese state-backed cyber operations
  • How cultural and political structures shape threat actor behavior
  • Comparing China’s cyber strategy to Russia, North Korea, and Iran
  • Why telecom, energy, and water systems are top targets
  • China’s 14th Five-Year Plan successes and projections for the 15th

NEWSLETTER

 

Get insights straight to your inbox

Please wait for the form to load..
Not you?

By submitting this form, I understand that my personal information will be processed in accordance with Rubrik's Privacy Policy