Data Security Decoded

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance


Listen Later

Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning.

In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Mei Danowski⁠, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.

What You’ll Learn:

  • Why Chinese cyber operations are fragmented and decentralized, and why that matters for defenders
  • How private companies in China are tied to the Communist Party and mobilized for cyber objectives
  • The strategic difference between China, Russia, North Korea, and Iran in their cyber operations
  • How China’s targeting priorities have shifted toward telecom, energy, water, and transport infrastructure
  • Three intelligence-driven approaches defenders can use to counter Chinese operations
  • What the 14th Five-Year Plan achieved in cyberspace, and what to expect in the 15th
  • Highlights:

    [01:50] The fragmented reality of Chinese state-backed cyber operations

    [05:28] How cultural and political structures shape threat actor behavior

    [08:47] Comparing China’s cyber strategy to Russia, North Korea, and Iran

    [12:45] Why telecom, energy, and water systems are top targets

    [21:24] China’s 14th Five-Year Plan successes and projections for the 15th

    Episode Resources:

    • Caleb Tolin on LinkedIn
    • Mei Danowski on LinkedIn
    • Natto Thoughts website
    • ...more
      View all episodesView all episodes
      Download on the App Store

      Data Security DecodedBy Rubrik

      • 5
      • 5
      • 5
      • 5
      • 5

      5

      14 ratings


      More shows like Data Security Decoded

      View all
      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,027 Listeners

      Smashing Security by Graham Cluley

      Smashing Security

      320 Listeners

      Hacking Humans by N2K Networks

      Hacking Humans

      317 Listeners

      Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

      Threat Vector by Palo Alto Networks

      40 Listeners