There are currently few things that worry CEOs worldwide as much as geopolitics. Cybersecurity is undoubtedly one of them. But what happens when you combine geopolitical conflicts and cyber threats?

Geopolitical cyber threats, that’s what.

This lethal combination threatens to disrupt economies, destabilize governments, and shatter global stability. That’s why it must be met with an ironclad cybersecurity strategy.

But what does that strategy entail?

That’s for Tom Vazdar and Venicia Solomons to answer. Tom is the chair of the Master’s Degree in Enterprise Cybersecurity program at the Open Institute of Technology (OPIT). Venicia is a seasoned cybersecurity architect and advocate who has rightfully earned the nickname “the Cyber Queen.”

Here’s what these two esteemed cyber professionals have to say about geopolitical cyber threats in their highly informative master class titled “Cyber Threat Landscape 2024: Navigating New Risks.”

What Are Geopolitical Cyber Threats?

Geopolitical threats refer to cyberattacks (or campaigns) driven by political motives. These attacks are often conducted by state-sponsored actors and have a specific strategic goal in mind.

For instance, Iran-backed hackers have recently been targeting U.S. water systems, aiming to disrupt Israeli-made equipment globally. This example also perfectly illustrates the targets of geopolitical cyberattacks – critical infrastructure, government systems, military networks, and other relevant entities.

But don’t jump to conclusions – the private sector isn’t immune to such attacks.

Cybercriminals have also targeted private companies to steal intellectual property, disrupt operations, or extort money. However, what differentiates these attacks from other cyberattacks is the motivation behind them.

Whether it’s through espionage, sabotage, or disinformation, geopolitical cyber threats always aim to achieve a political or strategic advantage for the attacker.

How Do State-Sponsored Cyber Threats Differ From Other Cyberattacks?

In their master class, Tom and Venicia specifically focus on state-sponsored cyber threats, even though they aren’t the only type of geopolitical cyber threats. Why? Because they’re the most advanced and sophisticated cyber threats.

As Venicia puts it, state-sponsored cyberattacks involve “specialist hacking techniques,” “stealthy behavior,” and “stealthy execution.” That’s why the consequences of these attacks are often only seen after significant damage has been done.

This leads us to another distinctive characteristic of state-sponsored cyberattacks – they typically involve long-term execution.

You see, other forms of cyberattacks usually want to reach their goal as soon as possible. For instance, a ransomware attack will infiltrate your system, and the hacker will ask for ransom straight away.

A state-sponsored cyberattack, on the other hand, usually plays the long game. That’s why they’re considered an advanced persistent threat (APT). Remaining undetected for a long time allows these threats to collect lots of critical data and perform long-term espionage.

Tom adds that the goal of these cyberattacks is another important distinction. As mentioned, they usually have a strategic goal in mind. “Regular” cyber threats, in contrast, typically only aim for financial profit.

Why Is Geopolitical Cybersecurity Important?

For the most part, traditional warfare was limited to three battlefields – the land, the air, and the sea. However, as Tom points out, two vital battlefields have joined the fray – space and cyberspace.

Sure, threats in cyberspace aren’t overtly visible like those on land, air, or sea. However, they can be just as devastating, if not more so – especially if they’re geopolitical cyber threats.

Here’s how Tom and Venicia break down the importance of geopolitical cybersecurity.

Protecting Against Espionage

As mentioned, espionage is one of the leading types of geopolitical cyberattacks. Since espionage aims to collect as much valuable information as possible, these attacks are typically highly refined, which allows them to remain undiscovered for months on end.

Venicia points out that the recent geopolitical tensions have led to increased cyber espionage. That’s what makes solid geopolitical cybersecurity more important than ever. Let one intruder into your network, and you’re essentially giving away all your classified information (past, present, and future).

Avoiding Manipulation

2024 is an election year. This means that “influence operations, disinformation operations, [and] deep fake operations” will run more rampant than ever, as Tom warns. Ultimately, these operations aim to shape public opinion and undermine trust in democratic institutions. These outcomes are never desirable, let alone during such a crucial time.

That’s where cybersecurity comes into play.

These measures help secure digital platforms, detect (and remove) false information, and (in this specific scenario) safeguard electoral systems.

Protecting the Economy

As mentioned, geopolitical cyberattacks aren’t typically done for financial gain. However, they can still cause massive financial losses. How? By targeting “public organizations and private entities that make a large contribution to a country’s economy,” as Venicia explains.

And a world that’s still reeling from the effects the COVID-19 pandemic had on the global economy can’t possibly handle another major disruption. That’s why any similar threat should never be taken lightly.

How to Combat Geopolitical Cyber Threats

Now that you know why geopolitical cyber threats must be combatted, let’s discuss how this can be done.

Keep All Aspects in Mind

There are numerous factors that go into protecting against geopolitical cyber threats. But for this protection to actually work, all these factors must be considered when devising a defense strategy.

For starters, this means protecting all critical infrastructure sectors. Tom lists just some of them –financial services, healthcare and public health, and transportation systems. However, one thing applies to all critical infrastructure sectors – they aren’t “independent islands,” as Tom puts it.

They’re all part of a larger ecosystem.

Each sector can only be protected if there’s a holistic approach to cybersecurity, one that considers interdependencies between sectors and the potential cascading effects of cyber disruptions. This way, in case of a cyberattack, every sector can provide support and respond effectively to minimize the impact.

Foster Collaboration

The collaborative approach shouldn’t only apply to critical infrastructure sectors. All stakeholders, including government agencies, cybersecurity experts, and the private sector, must work together to address geopolitical threats effectively.

This collaboration can take many forms.

However, Tom highlights the three most important ones on the global level – sharing intelligence, developing international norms and agreements, and establishing cybersecurity alliances.

Our experts list some of the most useful alliances and resources in this regard:

  • The No More Ransom Project helps organizations combat ransomware attacks by providing decryption keys, thus returning their vital information.
  • Public-Private Partnerships (PPPs) worldwide allow for sharing cyber threat intelligence among industry partners to improve defenses collectively.
  • The Budapest Convention on Cybercrime sets out international standards for combating cybercrime, promoting cooperation among countries to tackle cyber threats effectively.

Focus on Critical Infrastructure

By now, one thing’s clear – protecting critical infrastructure against geopolitical cyber threats is paramount.

According to Tom, collaboration plays a key role here as well. In his words, “The only way to protect [critical infrastructure] is that collaborative effort between government and the private sector because they cannot go without each other; they have to work together.”

Implement a Robust Cybersecurity Framework

A comprehensive and collaborative approach to combating geopolitical threats is just the preamble. The implementation of a robust cybersecurity framework is where the actual protection starts. Of course, these systems should be based on the intelligence collected through collaboration and education.

However, the system itself is just as important. After all, protecting critical infrastructure and other elements of similar importance requires more than just traditional anti-virus software!

According to Tom, a comprehensive cybersecurity framework will comprise four elements – threat detection, response tools, regular security assessments, and training. The specifics will vary by organization, and every relevant employee should be familiar with them.

Tom also emphasizes the importance of adopting a multi-layer approach to cybersecurity defenses. This way, even if one layer is breached, others will provide protection and prevent a total collapse of the system.

Stay Vigilant

Organizations should always be on the lookout for an uptick in suspicious activities, especially during times of geopolitical conflicts. This vigilance includes monitoring network traffic for anomalies, conducting regular security audits, and staying on top of the latest cyber threats and—let’s face it—the latest geopolitical conflicts.

Train Your Employees

The importance of thorough cybersecurity education can’t be understated. After all, employees are usually the first line of defense against cyber threats. So, they should be trained to handle the information system properly within the organization. They should know what to do and what not to do before, during, and after a geopolitical cyberattack.

However, there’s another type of employee crucial for the strength of cybersecurity within an organization – cybersecurity professionals themselves.

These individuals must be on top of their game at all times. One way to ensure this is to only hire professionals with ample experience and education. For instance, completing a renowned Master’s program like OPIT’s Enterprise Cybersecurity should be a huge green flag for any employer. It signals a strong commitment to cybersecurity excellence and a deep understanding of the latest trends and techniques in the field.

Invest in the education and professional development of your employees, and you stand a chance against the ever-evolving landscape of cyber threats, geopolitical and beyond.

Related posts

Juggling Work and Study: Interview With OPIT Student Karina
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Jun 5, 2025 6 min read

During the Open Institute of Technology’s (OPIT’s) 2025 Graduation Day, we conducted interviews with many recent graduates to understand why they chose OPIT, how they felt about the course, and what advice they might give to others considering studying at OPIT.

Karina is an experienced FinTech professional who is an experienced integration manager, ERP specialist, and business analyst. She was interested in learning AI applications to expand her career possibilities, and she chose OPIT’s MSc in Applied Data Science & AI.

In the interview, Karina discussed why she chose OPIT over other courses of study, the main challenges she faced when completing the course while working full-time, and the kind of support she received from OPIT and other students.

Why Study at OPIT?

Karina explained that she was interested in enhancing her AI skills to take advantage of a major emerging technology in the FinTech field. She said that she was looking for a course that was affordable and that she could manage alongside her current demanding job. Karina noted that she did not have the luxury to take time off to become a full-time student.

She was principally looking at courses in the United States and the United Kingdom. She found that comprehensive courses were expensive, costing upwards of $50,000, and did not always offer flexible study options. Meanwhile, flexible courses that she could complete while working offered excellent individual modules, but didn’t always add up to a coherent whole. This was something that set OPIT apart.

Karina admits that she was initially skeptical when she encountered OPIT because, at the time, it was still very new. OPIT only started offering courses in September 2023, so 2025 was the first cohort of graduates.

Nevertheless, Karina was interested in OPIT’s affordable study options and the flexibility of fully remote learning and part-time options. She said that when she looked into the course, she realized that it aligned very closely with what she was looking for.

In particular, Karina noted that she was always wary of further study because of the level of mathematics required in most computer science courses. She appreciated that OPIT’s course focused on understanding the underlying core principles and the potential applications, rather than the fine programming and mathematical details. This made the course more applicable to her professional life.

OPIT’s MSc in Applied Data Science & AI

The course Karina took was OPIT’s MSc in Applied Data Science & AI. It is a three- to four-term course (13 weeks), which can take between one and two years to complete, depending on the pace you choose and whether you choose the 90 or 120 ECTS option. As well as part-time, there are also regular and fast-track options.

The course is fully online and completed in English, with an accessible tuition fee of €2,250 per term, which is €6,750 for the 90 ECTS course and €9,000 for the 120 ECTS course. Payment plans are available as are scholarships, and discounts are available if you pay the full amount upfront.

It matches foundational tech modules with business application modules to build a strong foundation. It then ends with a term-long research project culminating in a thesis. Internships with industry partners are encouraged and facilitated by OPIT, or professionals can work on projects within their own companies.

Entry requirements include a bachelor’s degree or equivalency in any field, including non-tech fields, and English proficiency to a B2 level.

Faculty members include Pierluigi Casale, a former Data Science and AI Innovation Officer for the European Parliament and Principal Data Scientist at TomTom; Paco Awissi, former VP at PSL Group and an instructor at McGill University; and Marzi Bakhshandeh, a Senior Product Manager at ING.

Challenges and Support

Karina shared that her biggest challenge while studying at OPIT was time management and juggling the heavy learning schedule with her hectic job. She admitted that when balancing the two, there were times when her social life suffered, but it was doable. The key to her success was organization, time management, and the support of the rest of the cohort.

According to Karina, the cohort WhatsApp group was often a lifeline that helped keep her focused and optimistic during challenging times. Sharing challenges with others in the same boat and seeing the example of her peers often helped.

The OPIT Cohort

OPIT has a wide and varied cohort with over 300 students studying remotely from 78 countries around the world. Around 80% of OPIT’s students are already working professionals who are currently employed at top companies in a variety of industries. This includes global tech firms such as Accenture, Cisco, and Broadcom, FinTech companies like UBS, PwC, Deloitte, and the First Bank of Nigeria, and innovative startups and enterprises like Dynatrace, Leonardo, and the Pharo Foundation.

Study Methods

This cohort meets in OPIT’s online classrooms, powered by the Canvas Learning Management System (LMS). One of the world’s leading teaching and learning software, it acts as a virtual hub for all of OPIT’s academic activities, including live lectures and discussion boards. OPIT also uses the same portal to conduct continuous assessments and prepare students before final exams.

If you want to collaborate with other students, there is a collaboration tab where you can set up workrooms, and also an official Slack platform. Students tend to use WhatsApp for other informal communications.

If students need additional support, they can book an appointment with the course coordinator through Canvas to get advice on managing their workload and balancing their commitments. Students also get access to experienced career advisor Mike McCulloch, who can provide expert guidance.

A Supportive Environment

These services and resources create a supportive environment for OPIT students, which Karina says helped her throughout her course of study. Karina suggests organization and leaning into help from the community are the best ways to succeed when studying with OPIT.

Read the article
Leading in the Digital Age: Navigating Strategy in the Metaverse
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Jun 5, 2025 5 min read

In April 2025, Professor Francesco Derchi from the Open Institute of Technology (OPIT) and Chair of OPIT’s Digital Business programs entered the online classroom to talk about the current state of the Metaverse and what companies can do to engage with this technological shift. As an expert in digital marketing, he is well-placed to talk about how brands can leverage the Metaverse to further company goals.

Current State of the Metaverse

Francesco started by exploring what the Metaverse is and the rocky history of its development. Although many associate the term Metaverse with Mark Zuckerberg’s 2021 announcement of Meta’s pivot toward a virtual immersive experience co-created by users, the concept actually existed long before. In his 1992 novel Snow Crash, author Neal Stephenson described a very similar concept, with people using avatars to seamlessly step out of the real world and into a highly connected virtual world.

Zuckerberg’s announcement was not even the start of real Metaverse-like experiences. Released in 2003, Second Life is a virtual world in which multiple users come together and engage through avatars. Participation in Second Life peaked at about one million active users in 2007. Similarly, Minecraft, released in 2011, is a virtual world where users can explore and build, and it offers multiplayer options.

What set Zuckerberg’s vision apart from these earlier iterations is that he imagined a much broader virtual world, with almost limitless creation and interaction possibilities. However, this proved much more difficult in practice.

Both Meta and Microsoft started investing significantly in the Metaverse at around the same time, with Microsoft completing its acquisition of Activision Blizzard – a gaming company that creates virtual world games such as World of Warcraft – in 2023 and working with Epic Games to bring Fortnite to their Xbox cloud gaming platform.

But limited adoption of new Metaverse technology saw both Meta and Microsoft announce major layoffs and cutbacks on their Metaverse investments.

Open Garden Metaverse

One of the major issues for the big Metaverse vision is that it requires an open-garden Metaverse. Matthew Ball defined this kind of Metaverse in his 2022 book:

“A massively scaled and interoperable network of real-time rendered 3D virtual worlds that can be experienced synchronously and persistently by an effectively unlimited number of users with an individual sense of presence, and with continuity of data, such as identity, history, entitlements, objects, communication, and payments.”

This vision requires an open Metaverse, a virtual world beyond any single company’s walled garden that allows interaction across platforms. With the current technology and state of the market, this is believed to be at least 10 years away.

With that in mind, Zuckerberg and Meta have pivoted away from expanding their Metaverse towards delivering devices such as AI glasses with augmented reality capabilities and virtual reality headsets.

Nevertheless, the Metaverse is still expanding today, but within walled garden contexts. Francesco pointed to Pokémon Go and Roblox as examples of Metaverse-esque words with enormous engagement and popularity.

Brands Engaging with the Metaverse: Nike Case Study

What does that mean for brands? Should they ignore the Metaverse until it becomes a more realistic proposition, or should they be establishing their Meta presence now?

Francesco used Nike’s successful approach to Meta engagement to show how brands can leverage the Metaverse today.

He pointed out that this was a strategic move from Nike to protect their brand. As a cultural phenomenon, people will naturally bring their affinity with Nike into the virtual space with them. If Nike doesn’t constantly monitor that presence, they can lose control of it. Rather than see this as a threat, Nike identified it as an opportunity. As people engage more online, their virtual appearance can become even more important than their physical appearance. Therefore, there is a space for Nike to occupy in this virtual world as a cultural icon.

Nike chose an ad hoc approach, going to users where they are and providing experiences within popular existing platforms.

As more than 1.5 million people play Fortnite every day, Nike started there, first selling a variety of virtual shoes that users can buy to kit out their avatars.

Roblox similarly has around 380 million monthly active users, so Nike entered the space and created NIKELAND, a purpose-built virtual area that offers a unique brand experience in the virtual world. For example, during NBA All-Star Week, LeBron James visited NIKELAND, where he coached and engaged with players. During the FIFA World Cup, NIKELAND let users claim two free soccer jerseys to show support for their favorite teams. According to statistics published at the end of 2023, in less than two years, NIKELAND had more than 34.9 million visitors, with over 13.4 billion hours of engagement and $185 million in NFT (non-fungible tokens or unique digital assets) sales.

Final Thoughts

Francesco concluded by discussing that while Nike has been successful in the Metaverse, this is not necessarily a success that will be simple for smaller brands to replicate. Nike was successful in the virtual world because they are a cultural phenomenon, and the Metaverse is a combination of technology and culture.

Therefore, brands today must decide how to engage with the current state of the Metaverse and prepare for its potential future expansion. Because existing Metaverses are walled gardens, brands also need to decide which Metaverses warrant investment or whether it is worth creating their own dedicated platforms. This all comes down to an appetite for risk.

Facing these types of challenges comes down to understanding the business potential of new technologies and making decisions based on risk and opportunity. OPIT’s BSc in Digital Business and MSc in Digital Business and Innovation help develop these skills, with Francesco also serving as program chair.

Read the article