Skip to content
  • Sign In
  • Try Now
View all events
Security Operations

Cyber Warfare in 90 Minutes

Published by O'Reilly Media, Inc.

Intermediate content levelIntermediate

An over-the-shoulder look at offensive cyber-physical ops in wartime

Course outcomes

  • Understand how Ukraine’s cyber troops plan, test, and launch cyber-physical attacks
  • Understand why the resources of a nation-state are not necessary to conduct effective cyber warfare
  • Learn how cyber fits into the find-fix-finish targeting cycle of special operations

Course description

The number of geopolitical cyberattacks has been increasing in both number and sophistication every year. Any security professional, especially those who work for a government entity or major international corporation, should be aware of the latest developments.

Join cyber warfare expert Jeffrey Caruso to discuss what we know and don’t know about the capabilities of hostile nation-states and nonstate actors, and what the war between Ukraine and Russia has taught us about guerilla tactics in the cyber world. You’ll examine acts of offensive cyber warfare from Jeffrey’s unique perspective as an over-the-shoulder observer of Ukraine’s cyber troops as they’ve conducted cyber and cyber-physical attacks against Russian targets since Russia’s invasion and annexation of Crimea in 2014.

What you’ll learn and how you can apply it

  • Appreciate what’s possible with few resources and a lot of motivation
  • Describe what a cyber-physical attack is, and how it’s planned and executed
  • Better evaluate what pundits and journalists have to say about cyber warfare

This live event is for you because...

  • You’re responsible for defending critical infrastructure from cyber and/or physical attacks.
  • You are curious about how it’s possible to cause fires, explosions, and other kinetic effects by attacking operational technology (OT).
  • You’ve heard about cyberattacks coming out of Russia and Iran but don’t know anything about cyberattacks coming into Russia and Iran.



The time frames are only estimates and may vary according to how the class is progressing.

Cyber warfare background and history (30 minutes)

  • Presentation: Israel’s post-Stuxnet cyber-physical attacks against Natanz (2020-2021)
  • Group discussion: Iran’s fuel enrichment program at Natanz is succeeding in spite of a series of destructive attacks; what does that tell us?

Recent developments in cyber warfare (30 minutes)

  • Presentation: The civilian hacker targeting matrix
  • Group discussion: If you’re a direct participant in hostilities, you may be putting yourself and your family at risk for a drone strike; where’s the line you don’t want to cross?
  • Break

The 2022 Ukraine/Russia war (20 minutes)

  • Presentation: Ukraine’s guerilla offensive tactics and procedures

Future directions (10 minutes)

  • Presentation: Cognitive warfare
  • Group discussion: What concerns you the most, cognitive warfare or cyber warfare?
  • Q&A

Your Instructor

  • Jeffrey Caruso

    Jeffrey Caruso (né Carr) has been an internationally-known cybersecurity adviser, author, and researcher since 2006. He invented REDACT, the world’s first global R&D database and search engine to assist companies in identifying which intellectual property is of value to foreign governments.

    He has provided analytic assistance to the Directorate of Intelligence of the Ministry of Defense of Ukraine’s Cyber Troops as well as assisted other departments in confidential matters.

    He is the founder and organizer of Suits & Spooks (now Safe House Global), a “collision” event to discuss hard challenges in the national security space.

    Jeffrey has contracted with the CIA’s Open Source Center’s Eurasia Desk as a Russia SME (2010), and has provided cyber intelligence briefings to the DIA, the FBI, and the Chief of Naval Operations Strategic Study Group.

    He has been a frequent lecturer at the U.S. Air Force Institute of Technology and the U.S. Army War College, and was a technical peer reviewer for Tallinn 2.0, the second edition of the Tallinn Manual on the International Law Applicable To Cyber Operations.

    Jeffrey’s book ‘Inside Cyber Warfare: Mapping the Cyber Underworld” has been published in two editions (2009 and 2011) by O’Reilly Media and continues to be used as a textbook in many university and military academy classrooms. Jeffrey is honored to be a Ponemon Research Distinguished Fellow, and a WikiStrat senior analyst.