There are currently few things that worry CEOs worldwide as much as geopolitics. Cybersecurity is undoubtedly one of them. But what happens when you combine geopolitical conflicts and cyber threats?

Geopolitical cyber threats, that’s what.

This lethal combination threatens to disrupt economies, destabilize governments, and shatter global stability. That’s why it must be met with an ironclad cybersecurity strategy.

But what does that strategy entail?

That’s for Tom Vazdar and Venicia Solomons to answer. Tom is the chair of the Master’s Degree in Enterprise Cybersecurity program at the Open Institute of Technology (OPIT). Venicia is a seasoned cybersecurity architect and advocate who has rightfully earned the nickname “the Cyber Queen.”

Here’s what these two esteemed cyber professionals have to say about geopolitical cyber threats in their highly informative master class titled “Cyber Threat Landscape 2024: Navigating New Risks.”

What Are Geopolitical Cyber Threats?

Geopolitical threats refer to cyberattacks (or campaigns) driven by political motives. These attacks are often conducted by state-sponsored actors and have a specific strategic goal in mind.

For instance, Iran-backed hackers have recently been targeting U.S. water systems, aiming to disrupt Israeli-made equipment globally. This example also perfectly illustrates the targets of geopolitical cyberattacks – critical infrastructure, government systems, military networks, and other relevant entities.

But don’t jump to conclusions – the private sector isn’t immune to such attacks.

Cybercriminals have also targeted private companies to steal intellectual property, disrupt operations, or extort money. However, what differentiates these attacks from other cyberattacks is the motivation behind them.

Whether it’s through espionage, sabotage, or disinformation, geopolitical cyber threats always aim to achieve a political or strategic advantage for the attacker.

How Do State-Sponsored Cyber Threats Differ From Other Cyberattacks?

In their master class, Tom and Venicia specifically focus on state-sponsored cyber threats, even though they aren’t the only type of geopolitical cyber threats. Why? Because they’re the most advanced and sophisticated cyber threats.

As Venicia puts it, state-sponsored cyberattacks involve “specialist hacking techniques,” “stealthy behavior,” and “stealthy execution.” That’s why the consequences of these attacks are often only seen after significant damage has been done.

This leads us to another distinctive characteristic of state-sponsored cyberattacks – they typically involve long-term execution.

You see, other forms of cyberattacks usually want to reach their goal as soon as possible. For instance, a ransomware attack will infiltrate your system, and the hacker will ask for ransom straight away.

A state-sponsored cyberattack, on the other hand, usually plays the long game. That’s why they’re considered an advanced persistent threat (APT). Remaining undetected for a long time allows these threats to collect lots of critical data and perform long-term espionage.

Tom adds that the goal of these cyberattacks is another important distinction. As mentioned, they usually have a strategic goal in mind. “Regular” cyber threats, in contrast, typically only aim for financial profit.

Why Is Geopolitical Cybersecurity Important?

For the most part, traditional warfare was limited to three battlefields – the land, the air, and the sea. However, as Tom points out, two vital battlefields have joined the fray – space and cyberspace.

Sure, threats in cyberspace aren’t overtly visible like those on land, air, or sea. However, they can be just as devastating, if not more so – especially if they’re geopolitical cyber threats.

Here’s how Tom and Venicia break down the importance of geopolitical cybersecurity.

Protecting Against Espionage

As mentioned, espionage is one of the leading types of geopolitical cyberattacks. Since espionage aims to collect as much valuable information as possible, these attacks are typically highly refined, which allows them to remain undiscovered for months on end.

Venicia points out that the recent geopolitical tensions have led to increased cyber espionage. That’s what makes solid geopolitical cybersecurity more important than ever. Let one intruder into your network, and you’re essentially giving away all your classified information (past, present, and future).

Avoiding Manipulation

2024 is an election year. This means that “influence operations, disinformation operations, [and] deep fake operations” will run more rampant than ever, as Tom warns. Ultimately, these operations aim to shape public opinion and undermine trust in democratic institutions. These outcomes are never desirable, let alone during such a crucial time.

That’s where cybersecurity comes into play.

These measures help secure digital platforms, detect (and remove) false information, and (in this specific scenario) safeguard electoral systems.

Protecting the Economy

As mentioned, geopolitical cyberattacks aren’t typically done for financial gain. However, they can still cause massive financial losses. How? By targeting “public organizations and private entities that make a large contribution to a country’s economy,” as Venicia explains.

And a world that’s still reeling from the effects the COVID-19 pandemic had on the global economy can’t possibly handle another major disruption. That’s why any similar threat should never be taken lightly.

How to Combat Geopolitical Cyber Threats

Now that you know why geopolitical cyber threats must be combatted, let’s discuss how this can be done.

Keep All Aspects in Mind

There are numerous factors that go into protecting against geopolitical cyber threats. But for this protection to actually work, all these factors must be considered when devising a defense strategy.

For starters, this means protecting all critical infrastructure sectors. Tom lists just some of them –financial services, healthcare and public health, and transportation systems. However, one thing applies to all critical infrastructure sectors – they aren’t “independent islands,” as Tom puts it.

They’re all part of a larger ecosystem.

Each sector can only be protected if there’s a holistic approach to cybersecurity, one that considers interdependencies between sectors and the potential cascading effects of cyber disruptions. This way, in case of a cyberattack, every sector can provide support and respond effectively to minimize the impact.

Foster Collaboration

The collaborative approach shouldn’t only apply to critical infrastructure sectors. All stakeholders, including government agencies, cybersecurity experts, and the private sector, must work together to address geopolitical threats effectively.

This collaboration can take many forms.

However, Tom highlights the three most important ones on the global level – sharing intelligence, developing international norms and agreements, and establishing cybersecurity alliances.

Our experts list some of the most useful alliances and resources in this regard:

  • The No More Ransom Project helps organizations combat ransomware attacks by providing decryption keys, thus returning their vital information.
  • Public-Private Partnerships (PPPs) worldwide allow for sharing cyber threat intelligence among industry partners to improve defenses collectively.
  • The Budapest Convention on Cybercrime sets out international standards for combating cybercrime, promoting cooperation among countries to tackle cyber threats effectively.

Focus on Critical Infrastructure

By now, one thing’s clear – protecting critical infrastructure against geopolitical cyber threats is paramount.

According to Tom, collaboration plays a key role here as well. In his words, “The only way to protect [critical infrastructure] is that collaborative effort between government and the private sector because they cannot go without each other; they have to work together.”

Implement a Robust Cybersecurity Framework

A comprehensive and collaborative approach to combating geopolitical threats is just the preamble. The implementation of a robust cybersecurity framework is where the actual protection starts. Of course, these systems should be based on the intelligence collected through collaboration and education.

However, the system itself is just as important. After all, protecting critical infrastructure and other elements of similar importance requires more than just traditional anti-virus software!

According to Tom, a comprehensive cybersecurity framework will comprise four elements – threat detection, response tools, regular security assessments, and training. The specifics will vary by organization, and every relevant employee should be familiar with them.

Tom also emphasizes the importance of adopting a multi-layer approach to cybersecurity defenses. This way, even if one layer is breached, others will provide protection and prevent a total collapse of the system.

Stay Vigilant

Organizations should always be on the lookout for an uptick in suspicious activities, especially during times of geopolitical conflicts. This vigilance includes monitoring network traffic for anomalies, conducting regular security audits, and staying on top of the latest cyber threats and—let’s face it—the latest geopolitical conflicts.

Train Your Employees

The importance of thorough cybersecurity education can’t be understated. After all, employees are usually the first line of defense against cyber threats. So, they should be trained to handle the information system properly within the organization. They should know what to do and what not to do before, during, and after a geopolitical cyberattack.

However, there’s another type of employee crucial for the strength of cybersecurity within an organization – cybersecurity professionals themselves.

These individuals must be on top of their game at all times. One way to ensure this is to only hire professionals with ample experience and education. For instance, completing a renowned Master’s program like OPIT’s Enterprise Cybersecurity should be a huge green flag for any employer. It signals a strong commitment to cybersecurity excellence and a deep understanding of the latest trends and techniques in the field.

Invest in the education and professional development of your employees, and you stand a chance against the ever-evolving landscape of cyber threats, geopolitical and beyond.

Related posts

Il Sole 24 Ore: Integrating Artificial Intelligence into the Enterprise – Challenges and Opportunities for CEOs and Management
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Apr 14, 2025 6 min read

Source:


Expert Pierluigi Casale analyzes the adoption of AI by companies, the ethical and regulatory challenges and the differentiated approach between large companies and SMEs

By Gianni Rusconi

Easier said than done: to paraphrase the well-known proverb, and to place it in the increasingly large collection of critical issues and opportunities related to artificial intelligence, the task that CEOs and management have to adequately integrate this technology into the company is indeed difficult. Pierluigi Casale, professor at OPIT (Open Institute of Technology, an academic institution founded two years ago and specialized in the field of Computer Science) and technical consultant to the European Parliament for the implementation and regulation of AI, is among those who contributed to the definition of the AI ​​Act, providing advice on aspects of safety and civil liability. His task, in short, is to ensure that the adoption of artificial intelligence (primarily within the parliamentary committees operating in Brussels) is not only efficient, but also ethical and compliant with regulations. And, obviously, his is not an easy task.

The experience gained over the last 15 years in the field of machine learning and the role played in organizations such as Europol and in leading technology companies are the requirements that Casale brings to the table to balance the needs of EU bodies with the pressure exerted by American Big Tech and to preserve an independent approach to the regulation of artificial intelligence. A technology, it is worth remembering, that implies broad and diversified knowledge, ranging from the regulatory/application spectrum to geopolitical issues, from computational limitations (common to European companies and public institutions) to the challenges related to training large-format language models.

CEOs and AI

When we specifically asked how CEOs and C-suites are “digesting” AI in terms of ethics, safety and responsibility, Casale did not shy away, framing the topic based on his own professional career. “I have noticed two trends in particular: the first concerns companies that started using artificial intelligence before the AI ​​Act and that today have the need, as well as the obligation, to adapt to the new ethical framework to be compliant and avoid sanctions; the second concerns companies, like the Italian ones, that are only now approaching this topic, often in terms of experimental and incomplete projects (the expression used literally is “proof of concept”, ed.) and without these having produced value. In this case, the ethical and regulatory component is integrated into the adoption process.”

In general, according to Casale, there is still a lot to do even from a purely regulatory perspective, due to the fact that there is not a total coherence of vision among the different countries and there is not the same speed in implementing the indications. Spain, in this regard, is setting an example, having established (with a royal decree of 8 November 2023) a dedicated “sandbox”, i.e. a regulatory experimentation space for artificial intelligence through the creation of a controlled test environment in the development and pre-marketing phase of some artificial intelligence systems, in order to verify compliance with the requirements and obligations set out in the AI ​​Act and to guide companies towards a path of regulated adoption of the technology.

Read the full article below (in Italian):

Read the article
The Lucky Future: How AI Aims to Change Everything
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Apr 10, 2025 7 min read

There is no question that the spread of artificial intelligence (AI) is having a profound impact on nearly every aspect of our lives.

But is an AI-powered future one to be feared, or does AI offer the promise of a “lucky future.”

That “lucky future” prediction comes from Zorina Alliata, principal AI Strategist at Amazon and AI faculty member at Georgetown University and the Open Institute of Technology (OPIT), in her recent webinar “The Lucky Future: How AI Aims to Change Everything” (February 18, 2025).

However, according to Alliata, such a future depends on how the technology develops and whether strategies can be implemented to mitigate the risks.

How AI Aims to Change Everything

For many people, AI is already changing the way they work. However, more broadly, AI has profoundly impacted how we consume information.

From the curation of a social media feed and the summary answer to a search query from Gemini at the top of your Google results page to the AI-powered chatbot that resolves your customer service issues, AI has quickly and quietly infiltrated nearly every aspect of our lives in the past few years.

While there have been significant concerns recently about the possibly negative impact of AI, Alliata’s “lucky future” prediction takes these fears into account. As she detailed in her webinar, a future with AI will have to take into consideration:

  • Where we are currently with AI and future trajectories
  • The impact AI is having on the job landscape
  • Sustainability concerns and ethical dilemmas
  • The fundamental risks associated with current AI technology

According to Alliata, by addressing these risks, we can craft a future in which AI helps individuals better align their needs with potential opportunities and limitations of the new technology.

Industry Applications of AI

While AI has been in development for decades, Alliata describes a period known as the “AI winter” during which educators like herself studied AI technology, but hadn’t arrived at a point of practical applications. Contributing to this period of uncertainty were concerns over how to make AI profitable as well.

That all changed about 10-15 years ago when machine learning (ML) improved significantly. This development led to a surge in the creation of business applications for AI. Beginning with automation and robotics for repetitive tasks, the technology progressed to data analysis – taking a deep dive into data and finding not only new information but new opportunities as well.

This further developed into generative AI capable of completing creative tasks. Generative AI now produces around one billion words per day, compared to the one trillion produced by humans.

We are now at the stage where AI can complete complex tasks involving multiple steps. In her webinar, Alliata gave the example of a team creating storyboards and user pathways for a new app they wanted to develop. Using photos and rough images, they were able to use AI to generate the code for the app, saving hundreds of hours of manpower.

The next step in AI evolution is Artificial General Intelligence (AGI), an extremely autonomous level of AI that can replicate or in some cases exceed human intelligence. While the benefits of such technology may readily be obvious to some, the industry itself is divided as to not only whether this form of AI is close at hand or simply unachievable with current tools and technology, but also whether it should be developed at all.

This unpredictability, according to Alliata, represents both the excitement and the concerns about AI.

The AI Revolution and the Job Market

According to Alliata, the job market is the next area where the AI revolution can profoundly impact our lives.

To date, the AI revolution has not resulted in widespread layoffs as initially feared. Instead of making employees redundant, many jobs have evolved to allow them to work alongside AI. In fact, AI has also created new jobs such as AI prompt writer.

However, the prediction is that as AI becomes more sophisticated, it will need less human support, resulting in a greater job churn. Alliata shared statistics from various studies predicting as many as 27% of all jobs being at high risk of becoming redundant from AI and 40% of working hours being impacted by language learning models (LLMs) like Chat GPT.

Furthermore, AI may impact some roles and industries more than others. For example, one study suggests that in high-income countries, 8.5% of jobs held by women were likely to be impacted by potential automation, compared to just 3.9% of jobs held by men.

Is AI Sustainable?

While Alliata shared the many ways in which AI can potentially save businesses time and money, she also highlighted that it is an expensive technology in terms of sustainability.

Conducting AI training and processing puts a heavy strain on central processing units (CPUs), requiring a great deal of energy. According to estimates, Chat GPT 3 alone uses as much electricity per day as 121 U.S. households in an entire year. Gartner predicts that by 2030, AI could consume 3.5% of the world’s electricity.

To reduce the energy requirements, Alliata highlighted potential paths forward in terms of hardware optimization, such as more energy-efficient chips, greater use of renewable energy sources, and algorithm optimization. For example, models that can be applied to a variety of uses based on prompt engineering and parameter-efficient tuning are more energy-efficient than training models from scratch.

Risks of Using Generative AI

While Alliata is clearly an advocate for the benefits of AI, she also highlighted the risks associated with using generative AI, particularly LLMs.

  • Uncertainty – While we rely on AI for answers, we aren’t always sure that the answers provided are accurate.
  • Hallucinations – Technology designed to answer questions can make up facts when it does not know the answer.
  • Copyright – The training of LLMs often uses copyrighted data for training without permission from the creator.
  • Bias – Biased data often trains LLMs, and that bias becomes part of the LLM’s programming and production.
  • Vulnerability – Users can bypass the original functionality of an LLM and use it for a different purpose.
  • Ethical Risks – AI applications pose significant ethical risks, including the creation of deepfakes, the erosion of human creativity, and the aforementioned risks of unemployment.

Mitigating these risks relies on pillars of responsibility for using AI, including value alignment of the application, accountability, transparency, and explainability.

The last one, according to Alliata, is vital on a human level. Imagine you work for a bank using AI to assess loan applications. If a loan is denied, the explanation you give to the customer can’t simply be “Because the AI said so.” There needs to be firm and explainable data behind the reasoning.

OPIT’s Masters in Responsible Artificial Intelligence explores the risks and responsibilities inherent in AI, as well as others.

A Lucky Future

Despite the potential risks, Alliata concludes that AI presents even more opportunities and solutions in the future.

Information overload and decision fatigue are major challenges today. Imagine you want to buy a new car. You have a dozen features you desire, alongside hundreds of options, as well as thousands of websites containing the relevant information. AI can help you cut through the noise and narrow the information down to what you need based on your specific requirements.

Alliata also shared how AI is changing healthcare, allowing patients to understand their health data, make informed choices, and find healthcare professionals who meet their needs.

It is this functionality that can lead to the “lucky future.” Personalized guidance based on an analysis of vast amounts of data means that each person is more likely to make the right decision with the right information at the right time.

Read the article