
March 17, 2026
Cyber security threats are evolving at a pace that is forcing organisations to rethink not only their technical controls, but their governance, communication strategies, and operational resilience.
In Episode 59, cyber security experts Nick Lovell, Adam Cunningham, and Adam Green explore how geopolitical tensions, shifting criminal incentives, and real-world attacks on critical infrastructure are reshaping the modern threat landscape.
One of the key themes emerging in today’s cyber environment is the changing motivation of threat actors. While ransomware groups have historically been driven by financial gain, there is growing evidence that some attacks — particularly those influenced by geopolitical tensions — are focused on disruption rather than monetisation.
This shift introduces a new level of unpredictability. Organisations can no longer assume that attackers will behave rationally or be open to negotiation. In many cases, the objective is simply to cause operational damage, undermine trust, or create broader systemic disruption.
As a result, cyber resilience strategies must evolve beyond breach prevention and incident containment to include preparation for sustained business interruption.
The widely discussed cyber incident involving medical device manufacturer Stryker provides a powerful example of how cyber attacks can create cascading real-world consequences.
Disruptions to manufacturing capabilities impacted hospitals across multiple countries, demonstrating how deeply interconnected modern supply chains have become. Even organisations that are not direct targets can find themselves exposed if they play a role in supporting critical infrastructure or essential services.
This highlights an important reality for business leaders: cyber risk is no longer confined within organisational boundaries. Suppliers, partners, and service providers all form part of the extended attack surface.
Encouragingly, many organisations are becoming better prepared to resist ransomware demands. Improved backup strategies and stronger recovery capabilities mean businesses are increasingly able to refuse payment and restore operations independently.
However, attackers are adapting quickly. Business email compromise and funds transfer fraud are emerging as highly lucrative alternatives. These attacks exploit human behaviour, business processes, and organisational culture rather than purely technical vulnerabilities.
In environments where employees feel pressure to act quickly or avoid questioning authority, a convincing email can still trigger significant financial loss.
This evolution reinforces the importance of embedding verification practices into everyday workflows and ensuring cyber awareness extends beyond the IT function.
While incident response planning has become more common, many organisations still underestimate the importance of crisis communication readiness.
Effective communication during a cyber incident is critical for maintaining stakeholder confidence, managing regulatory obligations, and coordinating internal decision-making. This becomes even more complex when incidents affect multiple geographies, supply chain partners, or essential services such as healthcare.
Leaders must ensure that communication strategies are integrated into cyber preparedness planning, with clearly defined responsibilities and escalation pathways.
The episode also explores the growing role of identity-focused attacks, including tactics such as MFA fatigue or “MFA flooding,” where attackers repeatedly trigger authentication prompts in the hope that a user will eventually approve access.
These methods demonstrate that even relatively simple techniques can be highly effective when combined with social engineering or operational pressure.
Strengthening identity governance, improving device posture visibility, and prioritising user awareness remain critical components of modern cyber defence.
As cyber threats continue to evolve, organisations must adopt a broader view of resilience, one that encompasses technical preparedness, business continuity, governance, and human behaviour.
The lessons from recent incidents and emerging attack trends are clear: cyber security is no longer just a technical discipline. It is a core leadership challenge that requires coordinated action across the enterprise.
For executives, security leaders, and risk professionals, Episode 59 offers valuable insights into how the threat landscape is changing, and what practical steps organisations can take today to strengthen their readiness for tomorrow’s disruptions.