Protect your organization against nation-state cyberattacks – Addressing the security implementation gaps

Learn how US organizations can close security implementation gaps and strengthen defenses against advanced persistent threat (APT) activity.

U.S. organizations have been called upon to increase cybersecurity vigilance in the wake of heightened U.S. pressure on Russia, Iran, and other global threat actors.

US organizations are constantly facing cyber and physical threats targeting their information systems and critical infrastructure Americans rely on every day. On the cyber front, these adversaries are known for their advanced persistent threat (APT) activity.

APT actors (Russian, Chinese, North Korean, Iranian governments, etc.) are well-resourced and engage in sophisticated malicious cyber activity that is targeted and aimed at prolonged network/system intrusion. APT goals could include espionage, data theft, and network/system disruption or destruction.

A Cybersecurity & Infrastructure Security Agency (CISA) advisory in December 2025 alerted US organizations to pro-Russian hacktivists conducting opportunistic attacks against US and global critical infrastructure. In addition to this, a joint advisory from the FBI, CISA, and the UK’s National Cyber Security Centre (NCSC) alerted US organizations to how hostile nation-state linked cyber threat actors exploit end-of-support edge devices to access and compromise data. 

U.S. organizations face an increasingly volatile cyber threat environment, significantly shaped by ongoing geopolitical conflict – especially Russia’s war against Ukraine and, most recently, heightened economic and political pressure on Iran. 

Current U.S. intelligence assessments show that Russia is still one of the most advanced and persistent cyber adversaries, with demonstrated capability to target critical infrastructure, defense contractors, government systems, and private-sector entities.

CISA reports that Russian state-sponsored actors have pre-positioned access within US critical infrastructure and continue to refine cyber techniques learned through wartime operations in Ukraine, increasing the likelihood of spillover attacks affecting Western organizations.

Beyond Russia, other major nation-state actors – including Iran, China, and North Korea – continue to escalate offensive cyber operations. Iran conducts disruptive attacks and influence operations aligned with regional conflicts and to thwart US economic and political pressure, while North Korea is still heavily invested in financially motivated attacks, including cryptocurrency theft and targeted intrusions against global financial networks.

Common cyberattack methods

These nation-state actors commonly employ sophisticated techniques, including phishing, credential theft, supply-chain infiltration, exploitation of zero-day vulnerabilities, vulnerable end-of-support devices, and attacks on remote-work infrastructure. The proliferation of hybrid and remote work environments has increased the attack surface exponentially, offering more opportunities for exploitation.

How to protect your company against cyberattacks

Defending against nation-state attacks requires careful assessment and enhancement of your current cybersecurity protections – including your people, processes, and technology – to understand your capabilities and implement further safeguards, as necessary. 

Recently, the FBI called on organizations to address their security implementation gaps by strengthening defenses through continuous monitoring, strict access controls, zero-trust security architectures, improved supply-chain governance, and executive-level cybersecurity engagement – an operation known as Winter Shield. 

Defensive readiness must include patching known exploited vulnerabilities, securing endpoints, enforcing multifactor authentication, and preparing for destructive and disruptive attacks through tested incident response and recovery plans.

Cyber defense recommendations for executives

  1.  Keep people at the heart of your defense plans. Humans tend to be the weakest link in cybersecurity, but they can also be a strong asset if they are trained on how to spot, avoid, and mitigate threats. Remind employees to be vigilant; refresh training and tip sheets about top threats, like phishing, ransomware, and weak passwords; and base training programs on current, specific threats. Extend training to all employees, including remote workers, as well as any third-party contractors (and subcontractors). Provide more specialized role-based training to employees with superuser or privileged access to IT assets. 
  2. Review your basics. Many of the traditional good-cyber-hygiene rules apply here: Encryption of data, use of VPNs, proper configuration of firewalls, updated anti-malware and intrusion-prevention software, and stringent password requirements. Enforce phishing-resistant multifactor authentication for all users – including company leadership – across all IT assets. In addition, deploy behavior-based detection to counter known Russian, Chinese, Iranian, and North Korean intrusion tactics.
  3. As remote and hybrid work continue, keep track of all hardware and software assets, and make sure you are securing the access coming into your environment. Assess VPNs, videoconferencing, and collaboration tools to help ensure adequate capacity for remote workers and minimize risks of infiltration or interception. Evaluate the privacy and security capabilities of remote collaboration tools related to access, storage, and sharing of data, including anything based in the cloud. 
  4. Tighten access across systems. Make sure that privileged access to all IT assets, including security tools, is well-controlled and monitored. Access should be granted on the principle of least privilege: Minimize employees’ access to applications to only the ones that are necessary to perform their jobs.
  5. Look outside your own walls. Perform security due diligence on suppliers, business partners, and any other third parties that have access to your systems and data. If you develop software in-house, strengthen supply-chain security with software bill of materials (SBOM) and vendor monitoring.
  6. Implement solutions or third-party services to monitor and log network behavior 24/7 and alert your team to any security events and incidents. And on that point…
  7. Don’t overlook security alerts. When your security monitoring tools tell you something is wrong, take the time to fully assess what is happening. Understand and use the full functionality of the controls you’ve invested in. Prevent false positive alerts from recurring.
  8. Make cybersecurity an ongoing process. Deploy tools to routinely perform patch management and maintenance. Conduct a security impact analysis prior to making changes to critical infrastructure and transition from technology that is at or near its end of life. 
  9.  Implement an adequate incident response plan. Take the approach of “it’s not if you will have an incident, but when,” and make sure everyone across your organization knows how to respond when it happens. The plan should be aligned to geopolitical escalation risks. Update plans to factor in any workforce changes, such as reductions in on-site IT staff, and consider testing your plans at a defined cadence, or at least annually. Review business continuity and disaster recovery plans, too. 
  10.  Implement immutable backups and micro-segmentation to mitigate hybrid APT -ransomware threats. This limits the impact of an intrusion.
  11. Finally, increase collaboration with federal partners. Engage with CISA, JCDC, InfraGard, and the FBI to improve situational awareness, receive early warnings, and strengthen coordinated response to nation state cyber threats.

Final thoughts

Nation state cyber threats are an operational reality for US organizations navigating an increasingly volatile geopolitical environment. Addressing security implementation gaps requires sustained executive attention and close coordination across people, processes, technology, and trusted external partners. 

CohnReznick helps organizations strengthen their cyber resilience by assessing security posture, identifying and closing implementation gaps, enhancing incident response readiness, and aligning cybersecurity programs with regulatory and national level guidance. With deep technical expertise and a clear understanding of business and risk priorities, we design and implement cyber defense programs that help prevent evolving nation state threats. 

OUR PEOPLE

Subject matter expertise

View All Specialists
Adonye-Chamberlain

Adonye Chamberlain

Manager, Cybersecurity, Technology Risk, and Privacy
Contact Adonye Adonye+Chamberlain Adonye.Chamberlain@cohnreznick.com

Looking for the full list of our dedicated professionals here at CohnReznick?

Close

Contact

Let’s start a conversation about your company’s strategic goals and vision for the future.

Please fill all required fields*

Please verify your information and check to see if all require fields have been filled in.

Please select job function
Please select job level
Please select country
Please select state
Please select industry
Please select topic

Related services

Our solutions are tailored to each client’s strategic business drivers, technologies, corporate structure, and culture.


This has been prepared for information purposes and general guidance only and does not constitute legal or professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is made as to the accuracy or completeness of the information contained in this publication, and CohnReznick, its partners, employees and agents accept no liability, and disclaim all responsibility, for the consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it.