The recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into their enterprise cyber risk posture and preparedness.
Every crisis that elevates to military engagements between cyber-active participants, changes the risk landscape of businesses, for people, operations, and data. This includes the company and its suppliers, partners, and customers.

Gauging the risk requires incorporation of factors that are vague at best, but understanding the enemy can provide a much clearer picture to help cybersecurity and executive leadership in making good decisions.
Like the current Russian-Ukrainian war, the participants in the Iran strikes are very active in the cyber world. The US, Israel, and Iran all have significant cyber offensive capabilities, that when used may have direct or indirect consequences on enterprises, critical infrastructures, and global trade.
Corporate organizations, including cybersecurity, should conduct an open risk assessment that is updated as the situation develops. The outcomes should highlight recommendations to mitigate unacceptable risks-of-loss.
The first concern should be for worker safety. There is an ethical and legal responsibility to make sure people are safe. It is just the right thing to do! So, understand if any worker, or their families, are at risk of harm and take appropriate steps in alignment with corporate and government direction.
The second is to understand the risks to operations. Cyber-attacks, potentially in combination with kinetic damage, may have an impact on operations. Direct attacks against corporate assets or critical infrastructures they depend upon, such as the electrical grid and communication networks, may cause interruption, damage, or instability of operations. Supply chain risks must also be included in assessments as such attacks occurring against 3rd party suppliers and vendors can have material impacts.
The last aspect is around data. Kinetic damage is a risk, but most specifically, cyber-attacks can have widespread impacts of destruction or corruption of business data. Again, the 3rd party risks are also very relevant.

During times of international instability and warfare, such as we are witnessing now, I recommend the following 5 steps for cybersecurity leaders to prepare and manage the evolving risks:
For all these scenarios, stress-test your assumptions about dependencies. What happens if specific personnel are unreachable? If a key cloud provider experiences disruption? If a critical SaaS platform is unavailable?
Resilience depends on understanding these constraints in advance.
Preparation does not eliminate risk, but it dramatically improves how an organization experiences and manages it. When security leaders combine clarity, discipline, readiness, and measured communication, they position the enterprise to navigate uncertainty with strength rather than reaction.
Cybersecurity leadership plays an important role in crisis management for companies that rely on digital technology, vendors, online services, and global communications.
Incorporate geopolitical crisis events into the corporate cyber risk posture and showcase how the company can be prepared, even for extreme situations like international warfare.
*** This is a Security Bloggers Network syndicated blog from Information Security Strategy authored by Matthew Rosenquist. Read the original post at: https://infosecstrategy.blogspot.com/2026/03/5-actions-critical-for-cybersecurity.html