Strat Cyber Advisors
Home
About
Cybersecurity Advisories
AI TOOLKIT
Articles
Affiliates
Strat Cyber Advisors
Home
About
Cybersecurity Advisories
AI TOOLKIT
Articles
Affiliates
More
  • Home
  • About
  • Cybersecurity Advisories
  • AI TOOLKIT
  • Articles
  • Affiliates
  • Home
  • About
  • Cybersecurity Advisories
  • AI TOOLKIT
  • Articles
  • Affiliates

Articles

Without Data, It Is Just an Opinion

Executive Summary

Cybersecurity has become a core arena of international politics and domestic governance, yet many cyber-related claims still rest on assertion rather than evidence. In this environment, data is not a technical afterthought but the strategic substrate of credible deterrence, alliance cohesion, and accountable decision-making. Evidence-based cyber governance, rooted in measurable indicators, shared metrics, and transparent attribution, provides the bridge between international relations theory and practical statecraft in the digital age.


Without Data, It Is Just an Opinion

In international relations (IR), claims that lack empirical grounding remain indistinguishable from opinion, regardless of how confidently they are expressed. The same applies to cybersecurity and government, where decisions are often made under time pressure, political scrutiny, and technical uncertainty. When cyber-related policy rests on unverified assumptions, it can distort threat perception, misallocate resources, and increase the risk of escalation between states.

Cyber operations now influence diplomacy, economic security, and domestic political stability, turning technical incidents into matters of national strategy. In this context, data about incidents, actors, and impacts becomes the core instrument that allows governments to move from reactive narrative management to disciplined, evidence-based governance.


Cybersecurity as Statecraft, Not Just IT

Cybersecurity has shifted from a peripheral IT issue to a strategic domain of power projection, signaling, and competition among states. Governments use cyber capabilities for espionage, disruption, and influence operations in ways designed to remain below the traditional threshold of armed conflict, which exploits a gray zone where legal and political responses are ambiguous.

This gray-zone character makes cybersecurity unusually vulnerable to political framing. When data on incident frequency, impact, and attribution is incomplete or siloed, policymakers may rely on partisan, bureaucratic, or ideological preferences to interpret events. Evidence-based cyber governance insists on systematic measurement and cross-validation, linking technical telemetry with strategic assessment rather than ad hoc political judgment.


Realism: Power, Deterrence, and Measurable Effects

Realist theory centers on power, deterrence, and survival in an anarchic international system. In cyberspace this translates into states using digital tools to impose costs, deny benefits, or threaten escalation. Deterrence is only credible when adversaries believe a state can and will respond, and that belief depends on demonstrable capabilities and observable patterns of response over time.

Without data on attempted intrusions, successful operations, response measures, and subsequent adversary behavior, claims of cyber deterrence remain political rhetoric. Longitudinal, data-driven analysis that tracks incident trends, response timelines, and adversary adaptations allows governments to test whether deterrent signals are working or merely being asserted. In this way, evidence turns cyber deterrence into an empirical question rather than a narrative of convenience.


Liberal Institutionalism: Institutions, Norms, and Shared Metrics

Liberal institutionalism emphasizes the role of institutions and norms in mitigating anarchy, and cyber governance is a prime testing ground for this logic. International and regional bodies, including UN Groups of Governmental Experts (GGE) and Open-ended Working Groups, as well as NATO and the EU, have advanced norms of responsible state behavior in cyberspace such as assistance to victims and a duty not to allow one’s territory to be used for malicious operations.

However, norms that are not supported by shared data are difficult to implement or enforce. Effective cyber cooperation requires common taxonomies for incidents, standardized reporting mechanisms, and interoperable risk metrics across allies and sectors. When partners operate with divergent or incomplete datasets, collective defense arrangements in cyberspace risk remaining declaratory rather than operational, which undermines both coordination and accountability. Data transparency among trusted states and public–private partners therefore becomes a condition for meaningful cyber norms and alliance cohesion.


Constructivism: Narratives, Perception, and Political Incentives

Constructivism highlights how identities, norms, and narratives shape state behavior, a dynamic that is amplified in cyberspace where technical opacity invites interpretive politics. Governments often frame cyber incidents to project strength, mobilize domestic support, or justify new authorities and spending, even when attribution is incomplete or highly uncertain. These narratives can rapidly crystallize into perceived facts in the public and diplomatic arena.

In the absence of data, threat inflation, premature attribution, and moralized framing can entrench adversarial identities and reduce diplomatic flexibility. Evidence acts as a moderating force. Publishing confidence levels, methodologies, and impact assessments constrains narrative excess and allows policymakers to differentiate between genuine strategic threats and politically useful but exaggerated risks. In this sense, data is not only technical evidence but also a tool of narrative discipline in both domestic and international politics.


Government Decision-Making: From Crisis Reaction to Evidence-Based Cyber Policy

Government decision-makers operate under strong incentives to act after high-profile cyber incidents affecting critical infrastructure, healthcare, finance, or democratic processes. Rapid action may be politically necessary, but without robust evidence it risks producing symbolic measures that are highly visible yet low in impact, which neither enhances security nor builds public trust. Evidence-based cybersecurity governance seeks to institutionalize a more rigorous approach.

Key elements include:

  • Verified attribution with explicit confidence thresholds. Instead of binary claims, governments can communicate graded confidence levels and methodologies, which support both legal accountability and diplomatic credibility.
  • Structured impact assessments. Measuring economic, operational, and societal harms using consistent indicators helps align response severity with actual damage and informs sanctions, countermeasures, and remediation priorities.
  • Comparative, cross-sector analysis. Aggregating and comparing incident data across sectors and jurisdictions reveals systemic vulnerabilities and prevents overreaction to isolated events. This enables more rational investment in resilience.
  • Integration into national security and governance frameworks. Embedding cyber risk metrics into broader national security strategies, legislative oversight, and public–private partnership arrangements converts technical data into strategic guidance and accountability mechanisms.

These practices shift cyber policy from episodic crisis management toward a continuous, evidence-based governance cycle of assessment, response, and adaptation.


Data, AI, and the Future of Cyber Governance

The scale, speed, and complexity of modern cyber operations require governments to rethink how they collect, fuse, and interpret data. AI-enabled detection and attribution, combined with strategic-level data fusion, can improve visibility into otherwise invisible hostile operations and geopolitically motivated activities. This enhances both early warning and the credibility of deterrence by making it harder for adversaries to operate undetected.

AI systems themselves must also be governed. Opaque algorithms can introduce new biases or errors, especially if they are trained on incomplete or skewed data. Evidence-based governance therefore applies not only to cyber incidents but also to the tools used to analyze them and demands auditability, human oversight, and clear performance metrics. The fusion of data, AI, and institutional oversight will shape how states exercise digital sovereignty and manage escalation risks in an increasingly contested cyberspace.


Bridging IR Theory and Cyber Practice

Cybersecurity policy now sits at the intersection of IR theory, domestic governance, and operational practice. Realism explains competition and the search for advantage, liberal institutionalism underlines the importance of rules, institutions, and burden-sharing, and constructivism illuminates how narratives and identities influence behavior. Data is the connective tissue that allows these frameworks to move from abstract analysis to operational strategy and makes claims testable rather than purely interpretive.

By grounding cyber decisions in empirical evidence, governments can strengthen the credibility of deterrence and defense strategies, enhance alliance coordination through shared metrics and reporting, reduce misperception and escalation risks by clarifying attribution and impact, and align political narratives with observable reality in ways that reinforce domestic legitimacy and international trust.

In international relations and government, assertions that are not supported by data are not strategy, they are opinion. In cybersecurity, where uncertainty is inherent but stakes are systemic, evidence does not eliminate ambiguity, but it disciplines decision-making. In an era of persistent cyber competition and geopolitical rivalry, governing by data is no longer optional. It is the foundation of credible governance and responsible statecraft.

Strat Cyber Advisors

Copyright © 2025 Strat Cyber Advisors - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept