DATA SECURITY DECODED

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance

with ⁠Mei Danowski

You can also listen on

SHARE

Headshot of Mei Danowski

Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning.

In this episode of ⁠Data Security Decoded⁠, join ⁠Caleb Tolin⁠ as he sits down with ⁠Mei Danowski⁠, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.

What You’ll Learn:

  • Why Chinese cyber operations are fragmented and decentralized, and why that matters for defenders
  • How private companies in China are tied to the Communist Party and mobilized for cyber objectives
  • The strategic difference between China, Russia, North Korea, and Iran in their cyber operations
  • How China’s targeting priorities have shifted toward telecom, energy, water, and transport infrastructure
  • Three intelligence-driven approaches defenders can use to counter Chinese operations
  • What the 14th Five-Year Plan achieved in cyberspace, and what to expect in the 15th
     

Episode Highlights:

  • The fragmented reality of Chinese state-backed cyber operations
  • How cultural and political structures shape threat actor behavior
  • Comparing China’s cyber strategy to Russia, North Korea, and Iran
  • Why telecom, energy, and water systems are top targets
  • China’s 14th Five-Year Plan successes and projections for the 15th
     

Episode Resources:

Explore other episodes