Both Russia and Ukraine are making demands and requests of companies to help control information around their conflict. However they respond has consequences. Credit: Thinkstock The Russian invasion of Ukraine has a very visible aspect as we see Ukrainians stand and fight the Russian military might. The geopolitical landscape is changing by the hour, as more governments take action to restrict Russia’s ability to wage war. Two aspects of the conflict have percolated to the top. These are the “information war” and the “war on information.” The actions of governments are creating a conundrum, for some, of business or conscience.Directives and requests will come from the CEO/board. It will be the CIO, CISO and biz ops who will shoulder the implementation.“Whether tech companies want to be or not, many now have to decide what role they play in a geopolitical conflict—in some cases for the first time. Geopolitics and technology have always been linked so decisions must be based on corporate culture and values. It is not enough to stay neutral, by the way, as neutrality is still a choice and still has implications, and the world is watching,” observes John Stewart, president, Talons Ventures, and cybersecurity career executive. The information warCISOs across the globe are opening their emergency action plans and ensuring they are prepared for a cyberattack, supply chain disruption, and the continuity of their business. As the geopolitical landscape has adjusted, company products are assisting or preventing the combatants from achieving their goals. Ukraine, for example, on February 28 requested Cloudflare to remove its services from their Russian customers and to block Russians and their entities from using their services. Similarly, Ukraine is asking for global assistance to engage in offensive cyber operations. One may deduce the removal of Cloudflare’s services would make their customers vulnerable to cyber threats that Cloudflare mitigates.The European Union decided on February 28 to make all information available via the satellite facility in Madrid to Ukraine, to include information specifically in reference to Russian troop disposition. The EU commented how its relationship and decisions concerning Russia would no longer be based solely on trade. The war on information This display of kinetic warfare is making its way into our living rooms via mainstream media and social networks—unless you live within Russia. There a different story is being projected to the populace via the government constraints on media and the internet.The Russian Federation has greatly limited the type of information that media outlets are allowed to share and going so granular as to prohibit the use of certain words such as, “war”, “invasion”, and “conflict.”In addition, Russia has constrained the Russian populace from western social networks by blocking them at the internet gateways. Thus, their efforts have effectively limited the news to that which fit into the “official” brackets. Ukraine has asked cable operators and social networks to block from Ukraine those channels that are emanating from Russia, such as Sputnik, RT and Rossiya1. The government has also asked that Meta curtail its services (Facebook, Instagram, etc.) out of Russia to limit disinformation that the Russians may be attempting to put forward.Similarly, Apple received a government request to curtail access to the Apple AppStore for customers in Russia. The intent was to force the millions of app users to begin inquiring as to why and learn that their country was engaged in conflict, far beyond the scope that is being described in Russia’s mainstream, government-controlled media. Distinguished Russian analyst Molly McKew described in her treatise “Fulcrum, abyss, salvation” how Ukraine has “absolutely crushed the information domain.” Which has largely negated the Russian attempts to shape the conflict’s narrative, and have the West, “tell that story on their behalf were utterly overwhelmed by Ukrainian mythmaking. We saw bravery, we saw heroes, we saw resolve, we saw determination — but more importantly, we saw skill, and creativity ….” In addition to the satellite information, the EU has pledged its full support to Ukraine to counter Russia’s disinformation efforts.What of the need for companies to have their eyes wide open to the situation on hand? Few companies have a geopolitical analyst on staff and rely on third parties for perspective and then squeeze it into their instance. For example, recognizing the shortcoming, Flashpoint Intelligence has opened its platform to all so decision-makers have access to the finished reports re Russia’s attack on Ukraine, which contain their analysts’ insights on the threats that may lay ahead.Companies need to find their best answersThere are right answers, wrong answers, and best answers. When this writer reached out for comment, he encountered a general unease. While many companies appear to be hoping they are not put in the position to be asked, they should prepare themselves. As Stewart noted above, they may find themselves in the position for the first time, to make a choice—a choice, even a waffle of indecision, which may have long-term implications. Related content feature How to ensure cybersecurity strategies align with the company’s risk tolerance One of the tenets of risk tolerance is considering the fallout of something going wrong. The risk may originate as a technical one, but for CISOs the challenge is deciphering the organization’s tolerance for the impact. By Rosalyn Page 03 Sep 2024 10 mins CSO and CISO Risk Management opinion 5 best practices for running a successful threat-informed defense in cybersecurity The concept is well understood but putting it to work is much harder. Leading organizations provide some guidance on how to best implement this robust defensive strategy. By Jon Oltsik 29 Aug 2024 6 mins CSO and CISO Threat and Vulnerability Management Endpoint Protection feature Is the vulnerability disclosure process glitched? How CISOs are being left in the dark Better communication and collaboration between researchers and vendors and improved bug reporting mechanisms could help address confusing and sometimes wholly suppressed bug reports. By Cynthia Brumfield 26 Aug 2024 10 mins CSO and CISO Threat and Vulnerability Management Data and Information Security opinion Who writes the code in your security software? You need to know Trusting but verifying the code in the security software you use may not be an easy task, but it’s a worthwhile endeavor. Here are some recommended actions. By Susan Bradley 19 Aug 2024 7 mins CSO and CISO Windows Security Security Software PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe