Cybersecurity Secrets, Courtesy of the Russian FSB

Cybersecurity Secrets, Courtesy of the Russian FSB


Effective cybersecurity depends on understanding the threat: who is attacking a system, what tactics and techniques they are using, and what they hope to accomplish. Security professionals get these answers from a wide variety of sources, but Gregory Crabb used a particularly interesting one—the Russian FSB.

During Owl’s recent event, Elevating the Federal Cybersecurity Discussion, Mr. Crabb, former CISO of the United States Postal Service and now founder of 10-8 LLC cyber consultancy, presented an animated talk on Cybersecurity Secrets for CISOs: Courtesy of the Russian FSB.

Mr. Crabb shared compelling stories about working with an official in Russia’s national security service to track an international crime ring, and the unique insights he gained into Russian security operations and cyber threats in general.

In detailing his experiences, Mr. Crabb shared four lessons he learned from interacting with Russian intelligence and cyber criminals. These lessons have direct bearing on preventing and detecting U.S. critical infrastructure assets:

  • Influence operations are key in the Russian culture. They regularly apply techniques, tactics and procedures to control those they wish to influence (like the citizenry), and are very good at disinformation.
  • Supply chains depend on trust, but supply chains are where Russians aim many attacks. The SolarWinds attack should have come as no surprise, nor should the next attack. This reality creates massive urgency for the government to address the imperative of Zero Trust architecture. As Mr. Crabb put it, “Zero Trust can’t be applied 10 years from now. It needs to be applied yesterday.”
  • Ransomware attacks originating in Russia will continue to be a threat in the long term. The overlap between Russian businessmen, politicians and organized crime figures means that little if anything will be done to mitigate the problem at its source.
  • Risk management and security operations need to be tuned to understanding the threat. Mr. Crabb emphasized the importance of seeking out information and learning from others, then applying those learnings to our own organizations.

The full presentation is available below. To learn more about how Owl’s hardware-enforced security solutions can enhance Zero Trust architecture and protect critical assets against advanced cyber threats, contact us for a consultation today.

Insights to your Inbox

Stay informed with the latest cybersecurity news and resources.

  • This field is for validation purposes and should be left unchanged.
Steve Stratton Author, Operation Skipjack

Operation Skipjack – Part 4: Gray Swan Unraveled – Collapse of the Plan

Chapter One Pacifica Presidential Palace – 24 hours later A random canine patrol along the perimeter of the palace had alerted on a car. Sirens blared as police cars raced to the p...
July 23, 2025
Amalia Rosen

Securing Power Plants in a Connected World: How Owl Talon One™ Gives Grid Operators Peace of Mind

The Challenge: Securing Power Plant Operations in a Hyper-Connected Grid Operators of today’s power plants are under relentless pressure. As utilities become increasingly interconnecte...
July 18, 2025
Steve Stratton Author, Operation Skipjack

Operation Skipjack – Part 3: Gray Swan Unraveled – The Countermoves Begin

Chapter One INDOPACOM Command Joint Staff Operations Center Camp H. M. Smith Aiea, Hawaii It’s right there below the surface, Admiral Nikki Fury, the INDOPACOM J3, thought as she s...
July 16, 2025