Ayman Gomaa
The contemporary battlefield has evolved from a purely physical to an increasingly digital domain. Today’s battlegrounds run through data centres, undersea cables, and the firmware of devices most organisations have never audited. As a retired special operations professional with over two decades of operational experience, including signals intelligence and cyber-domain exposure across 50 countries, I’ve seen this shift unfold in real time. And if there’s one thing I’m certain of, it’s that we are no longer preparing for a cyber war – we’re already in one.
Recent conflicts in Ukraine and the Middle East have confirmed what defence professionals saw coming years ago. Cyber operations now precede kinetic strikes. Digital infrastructure is targeted alongside physical. And the organizations that survive aren’t the ones with the best firewalls, they’re the ones built to absorb and adapt.
Here are the five rules that now define effective digital defence.
Rule 1: Assume You Are Already Targeted
Stop thinking about keeping adversaries out. Start assuming they are already in.
Modern attackers don’t announce themselves. They quietly map, probe, and observe, often for weeks or months before any visible action. We saw this clearly in Ukraine long before February 2022. And it continues to be the pattern in virtually every high-stakes operating environment.
This means prioritising zero-trust architecture, continuous monitoring, and detection capabilities that are fast enough to matter. Cybersecurity isn’t simply an IT function; it is a strategic priority that requires executive-level ownership.
Rule 2: Build Redundancy, Not Dependence on a Single System
Single points of failure are major liabilities. If you over-rely on a single cloud provider, region, or vendor, you create the kind of vulnerability that adversaries actively target. When access is disrupted, for example, by cyberattack, sanctions, or infrastructure failure, organisations without layered redundancy (e.g. built-in backups and alternative systems) simply stop functioning.
In practice, this looks like multi-cloud deployment, geographic data distribution, and secure offline backups. Governments are beginning to mandate this for financial institutions and critical sectors, and I believe other entities should treat alternative resources as a baseline, rather than an advanced practice.
Rule 3: Every Connected Device Is an Entry Point
The attack surface is no longer defined by servers and networks. It includes every device connected to your environment.
In multiple recent conflict zones, unsecured CCTV cameras were accessed remotely and used for targeting and surveillance. Drones, telecom infrastructure, and civilian devices have all become entry points for attackers. The majority of these breaches stem from entirely preventable failures: default passwords, weak authentication, and unpatched systems.
Addressing these basic gaps alone can dramatically reduce exposure. The rule is simple: if it connects, it must be secured.
Rule 4: Design for Continuity Under Attack
Disruption is now a given. The goal is not to prevent it entirely, but to operate through it.
In Ukraine, coordinated cyberattacks against power grids and telecom systems ran alongside physical strikes. Organisations that kept operating were those designed to absorb disruption and adapt accordingly, using network segmentation, zero-trust access controls, automated response, and clear continuity protocols. This marks a fundamental shift. Digital defence today is about endurance not perfection.
Rule 5: Build Partnerships Before You Need Them
No organisation defends itself in isolation. Not in conventional warfare, and not in the digital world either. Effective digital defence requires pre-built frameworks across governments, cloud providers, telecom operators, and the private sector. When a crisis hits, those with trusted, rehearsed relationships can respond immediately by rerouting traffic, shifting workloads, and restoring operations. Those who are reactive lose valuable time negotiating access they should have secured years earlier.
Trust isn’t built in a crisis. It is spent.
The truth is, the front lines have shifted into places most organisations don’t routinely look. Into systems, infrastructure, and the quiet but critical connections that keep everything running.
The organisations that come out stronger won’t be the ones trying to eliminate every risk. They’ll be the ones who understand how to operate with it, building resilience into how they think, decide, and respond. Because in this environment, the real risk isn’t just being targeted. It’s not being prepared for what happens next. That’s when you’re forced into reacting to threats you can’t see and can no longer control.
(The author is Global Leadership Strategist, Special Operations Veteran, and Founder of Acacia Innovations Technology)

