Companies Need to Be on High Alert for Cyber Threats Amid Iran Conflict: TrustedSec's David Kennedy

CNBC Television
CNBC TelevisionMar 12, 2026

Why It Matters

The heightened geopolitical tension translates into immediate risk for businesses worldwide, as cyber attacks can cause operational downtime and data breaches. Understanding and preparing for these threats is crucial to protect revenue and reputation.

Key Takeaways

  • Iran conflict fuels state-sponsored cyber attacks
  • Supply chain vulnerabilities become primary entry points
  • Zero Trust architecture mitigates lateral movement risks
  • Continuous monitoring essential for rapid threat detection
  • Incident response plans must be regularly exercised

Pulse Analysis

The war between Israel and Iran has spilled over into the digital realm, prompting a surge in cyber operations that extend far beyond the Middle East. Iranian intelligence agencies, bolstered by state resources, are leveraging ransomware, credential‑stuffing, and destructive malware to pressure adversaries and extract financial gains. This escalation is not confined to government targets; multinational corporations, especially those with supply‑chain ties to the region, are now on the radar of sophisticated threat actors. As geopolitical friction intensifies, the probability of collateral damage to global business networks rises sharply.

David Kennedy, a former NSA cyber‑warrior and Marine Corps hacker, brings decades of experience in counter‑intelligence and offensive operations to the conversation. On The Exchange, he warned that Iranian groups are likely to adopt hybrid tactics, blending espionage with disruptive attacks that can cripple production lines or manipulate market data. Kennedy advocates for a zero‑trust security model, where every user and device is continuously verified, reducing the attack surface for lateral movement. He also stresses the importance of integrating real‑time threat intelligence feeds to anticipate adversary techniques before they materialize.

Enterprises can translate Kennedy’s warnings into actionable defenses by strengthening supply‑chain vetting, deploying continuous network monitoring, and conducting regular red‑team exercises. Implementing automated anomaly detection helps surface suspicious activity that traditional signatures miss, while a well‑drilled incident‑response playbook ensures swift containment and recovery. Companies that invest in cross‑functional cyber‑risk governance—uniting IT, legal, and executive leadership—are better positioned to navigate the volatility introduced by state‑backed attacks. As the Iran conflict persists, maintaining a resilient cyber posture will be a decisive factor in safeguarding revenue streams and brand trust.

Original Description

David Kennedy, former NSA and Marine Corps hacker, joins 'The Exchange' to discuss the rising risk of cyber threats amid the war with Iran.

Comments

Want to join the conversation?

Loading comments...