Cyber Focus: Cybersecurity, National Security, and Critical Infrastructure
America is asking more from its critical infrastructure just as adversaries are finding more ways to target it. AI, data centers, electrification, and next-generation energy systems all depend on operational technology—the control systems that keep power, water, transportation, and industry moving. As that backbone grows more connected, the stakes of securing it grow even higher. In this episode of Cyber Focus, Frank Cilluffo speaks with Zach Tudor, Associate Laboratory Director at Idaho National Laboratory, about how INL tests and secures critical infrastructure at scale. Tudor explains...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
A cyber incident can damage far more than systems and networks. It can also become a reputational crisis, especially when false or misleading narratives move faster than facts. In this episode of Cyber Focus, Frank Cilluffo speaks with Preston Golson of Brunswick Group about why organizations need to treat reputation as a vulnerability that can be tested, stress-tested, and defended much like any other part of their cyber posture. Drawing on his work in cyber incident response and his earlier career at the CIA, Golson explains how misinformation and disinformation take hold, why many damaging...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Cybersecurity’s history is often told through breaches, crime, and disruption. Joe Menn argues that the story of early hacker culture also offers something constructive: a model for how technical curiosity, ethical reflection, and independent thinking can shape the public good. Drawing from his work on Cult of the Dead Cow, Menn traces how figures once associated with pranks, underground tools, and legal gray zones helped influence vulnerability disclosure, hacktivism, privacy debates, and even the way government and major companies think about security today. But the episode does not stay...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Cybersecurity now reaches far beyond government networks and traditional IT systems. In this episode, Sami Khoury explains how the threat environment increasingly touches critical infrastructure, operational technology, undersea cables, and space—and why that shift is pushing governments to work more closely with private industry and trusted international partners. Drawing on more than three decades in Canadian government, Khoury offers a clear view of how Canada has built out its cyber posture, how the Canadian Centre for Cyber Security fits into that mission, and where the threat is...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Ukraine’s cyber defense has become one of the clearest real-world tests of what resilience actually looks like under sustained attack. In this episode of Cyber Focus, Greg Rattray explains why Ukrainian defenders held up better than many expected, and what their experience reveals about the limits of prevention, the value of shared visibility, and the growing operational role of the private sector. Drawing on his work leading the Cyber Defense Assistance Collaborative, Rattray argues that exposing adversary activity across a more “brightly illuminated cyberspace” helped blunt...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Overview Transatlantic cyber cooperation is being tested by political strain, regulatory divergence, and competing ideas about sovereignty, trust, and market access. In this episode of Cyber Focus, Sébastien Garnault argues that if the United States and Europe want to keep working together on security, they need to move quickly to make that cooperation practical, especially in critical infrastructure and digital markets. Speaking from a French private-sector perspective, Garnault makes the case that governments alone may not be able to repair or sustain that cooperation at the speed the...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Electricity demand is surging—and DOE’s Alex Fitzsimmons argues that the country’s ability to “keep the lights on” is now inseparable from how fast we can expand energy infrastructure, how we manage affordability, and how seriously we treat security. In this conversation with Frank Cilluffo, Fitzsimmons, the Acting Under Secretary of Energy and Director of the Office of Cybersecurity, Energy Security, and Emergency Response (CESER), frames “energy dominance” as a practical governing problem: meet rapid load growth (including from AI and data centers), avoid reliability...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Cyber deterrence has long lagged behind the threat. In this special episode of Cyber Focus recorded on March 11, 2026, White House National Cyber Director Sean Cairncross argues that the United States can no longer afford a posture built mainly around resilience and response while adversaries, criminal groups, and state-backed proxies operate at low cost and low risk. He presents President Trump’s new National Cyber Strategy as an effort to change that calculus by aligning government policy, offensive and defensive capabilities, industry partnership, and international coordination...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Cyber is now woven into modern conflict, alongside conventional military force. In this episode, Frank Cilluffo examines how that shift shapes the threat from Iran—especially the risk of cyber retaliation aimed at U.S. critical infrastructure, U.S. businesses, and public confidence. Rear Admiral (Ret.) Mark Montgomery of the Foundation for Defense of Democracies brings a strategic and military lens to the discussion, explaining how cyber is being built into conflict planning alongside kinetic operations. Cynthia Kaiser, a former FBI cyber leader now with Halcyon, brings an operational view...
info_outlineCyber Focus: Cybersecurity, National Security, and Critical Infrastructure
Cyber incident reporting is about to become mandatory for much of critical infrastructure—and the details are where the fight is. On February 26th, Frank Cilluffo spoke with Inside Cybersecurity managing editor Sara Friedman about CIRCIA’s proposed reporting rules, what industry says is overbroad, and why the 72-hour clock is hard in the real world. They also dig into overlap with other federal requirements, CISA’s capacity to execute the rulemaking, and what “getting it right” means for public-private trust. The conversation then pivots to NIST, AI agent standards, and how...
info_outlineCyber threats against the Defense Industrial Base (DIB) don’t stop at the battlefield—they extend into suppliers, perimeter devices, and even hiring pipelines. Luke McNamara of Google’s Threat Intelligence Group joins Frank Cilluffo to unpack Mandiant’s report Beyond the Battlefield: Threats to the Defense Intelligence Base and the patterns it flags across today’s threat landscape. They discuss how the war in Ukraine is shaping targeting priorities, why China’s cyber espionage increasingly begins at the network edge, and how “fast follower” exploit cycles compress patch timelines. McNamara also explains the North Korean IT worker problem, where remote hiring fraud can create both revenue and potential access pathways. The takeaway for mid-sized defense suppliers is practical: harden identity, reduce perimeter exposure, and assume meaningful risk often starts outside traditional corporate visibility.
Main Topics Covered
- Why manufacturing remains a top target and a warning sign for broader supply-chain risk
- How the war in Ukraine is influencing cyber targeting tied to drones and UAS ecosystems
- China’s focus on edge-device compromise (VPNs, routers, email gateways) and why it matters
- The “fast follower” dynamic that turns one vulnerability into many intrusions
- North Korean IT worker operations, remote hiring fraud, and AI-enabled deception
- The highest-leverage defensive priorities for DIB organizations, especially identity and MFA
Key Quotes
“Manufacturing is always the most targeted sector going back to 2020. And I think that’s a larger canary in the coal mine.” — Luke McNamara
“It’s not just some of these top-tier Chinese APT actors and their ability to leverage these as a zero-day, but the ability for secondary groups, once some of the details leak around a particular vulnerability, to start weaponizing it themselves.” — Luke McNamara
“If I had to narrow it down to one category to put more resources to, I would say identity…hardening around the identity piece is certainly key.” — Luke McNamara
"Organizations that are more aware of [the North Korean IT worker infiltration], where the security teams have met with their HR folks, their recruiters, helped inform them about the nature of these threats, I think they're a little bit better secured." — Luke McNamara
"It sounds more like a movie than reality, but it's happening." — Frank Cilluffo
Relevant Links and Resources
Mandiant report — Beyond the Battlefield: Threats to the Defense Intelligence Base
Mandiant podcast — Defenders Advantage
Guest Bio
Luke McNamara is a Deputy Chief Analyst at Google Cloud’s Mandiant Intelligence and part of Google’s Threat Intelligence Group, focused on cyber threat trends and emerging risks.