The Cyber Statecraft Initiative works at the nexus of geopolitics, technology, and security to craft strategies to help shape the conduct of statecraft and to better inform and secure users. This work extends through the competition of state and non-state actors, the security of the internet and computing systems, the safety of operational technology and physical systems, and the communities of cyberspace. The Initiative convenes a diverse network of passionate and knowledgeable contributors, bridging the gap among technical, policy, and user communities.

To keep up to date with our latest work, check us out on:

Our Work

Our Team

Cyber Statecraft Fellows

Events and programs

CSI is dedicated to convening a diverse network of passionate and knowledgeable contributors, bridging the gap among technical, policy, and user communities. Check out our past events here and make sure to keep an eye out for our future events by following us on Twitter and LinkedIn.

Recent Publications

November 2024

Take the Bribe but Watch Your Back: Why Russia Imprisoned a Security Officer for Taking Cybercriminal Payoffs 

by Justin Sherman

Russia imprisoned a security service officer for taking bribes from cybercriminals—showing not a willingness to crack down on cybercrime, but instead just how much the Kremlin wants to maintain its cybercrime protection racket.
Read More
October 2024

The 5×5—The evolving role of CISOs and senior cybersecurity executives

by Nitansha Bansal

For the Cybersecurity Awareness Month, senior cybersecurity executives share their insights into the evolution of their roles.
Read More
September 2024

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

The Mythical Beasts project pulls back the curtain on the connections between 435 entities across forty-two countries in the global spyware market.
Read More
September 2024

Mythical Beasts and Where to Find Them: Data and Methodology

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Learn more about the methodology and dataset behind Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights
Read More
September 2024

Mythical Beasts and Where to Find Them

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights is concerned with the commercial market for spyware and provides data on market participants.
Read More
August 2024

AI in Cyber and Software Security:  What’s Driving Opportunities and Risks?

by Maia Hamin, Jennifer Lin, Trey Herr

This issue brief discusses the drivers of evolving risks and opportunities presented by generative artificial intelligence (GAI), particularly in cybersecurity, while acknowledging the broader implications for policymakers and for national security.
Read More
July 2024

Russia’s Digital Tech Isolationism: Domestic Innovation, Digital Fragmentation, and the Kremlin’s Push to Replace Western Digital Technology 

by Justin Sherman

Russia’s technological isolation is both a reality and a desired goal for Moscow. This piece explores the impacts of this phenomenon and offers recommendations for how to deal with that evolving digital ecosystem.
Read More
July 2024

OT Cyber Policy: The Titanic or the Iceberg

by Danielle Jablanski

Current policy does not address the issue of cyber-physical security with a systemic approach, instead focusing with tunnel vision on specific events. This analysis uses the iceberg model for systems thinking to address policy gaps in the OT ecosystem, detailing recommendations for the Cybersecurity and Infrastructure Security Agency (CISA).
Read More
July 2024

The Impact of Corruption on Cybersecurity: Rethinking National Strategies Across the Global South  

by Robert Peacock

As the Global South prepares for the next stage in ICT development, governments must prioritize policies that reduce corruption in critical network software procurement to protect those countries’ developing cyberspace.
Read More
June 2024

User in the Middle: An Interoperability and Security Guide for Policymakers

by Maia Hamin, Alphaeus Hanson

When technologies work together, it benefits users and the digital ecosystem. Policymakers can advance interoperability and security in tandem by understanding how each impacts the other.
Read More

LICENSING CSI GRAPHICS

All original graphics created by the Cyber Statecraft Initiative (CSI) are available for re-use under the following conditions:

  • Written permission must be granted by CSI.
  • Graphics may be copied and distributed in any medium or format in unadapted form only, for noncommerical purposes, and only so long as attribution is given.*
  • The attribution must reference the Cyber Statecraft Initiative and include a link to the content.

CSI cannot grant permission for the use of images or graphics licensed from third parties.

*Language based on Creative Commons CC BY-NC-ND 4.0