Cyber Statecraft Initiative

Wed, Nov 20, 2024

Seizing the Win: Navigating Competition and Hands-on Learning through Cyber 9/12 

Competitors and judges from the inaugural Cyber 9/12 Strategy Challenge in Costa Rica share their perspectives on how to leverage teamwork and interdisciplinary skills to address tomorrow’s cyber challenges.

by Safa Shahwan Edwards, Emerson Johnston

Cyber 9/12 Strategy Challenge Developing the Cyber Workforce

Wed, Nov 13, 2024

The Role of Data in Improving Cyber Insurance Pricing

In order to improve cybersecurity through cyber insurance, the private sector should aggregate cyber incident data to inform risk models and in turn, more accurately price cyber premiums.

by Alphaeus Hanson

Cybersecurity Standards and Requirements Resilience

Mon, Nov 4, 2024

Take the Bribe but Watch Your Back: Why Russia Imprisoned a Security Officer for Taking Cybercriminal Payoffs 

Russia imprisoned a security service officer for taking bribes from cybercriminals—showing not a willingness to crack down on cybercrime, but instead just how much the Kremlin wants to maintain its cybercrime protection racket.

by Justin Sherman

Combating Cybercrime Cybersecurity
CSI_ 5X5_CISOs and senior cybersecurity executives

Wed, Oct 23, 2024

The 5×5—The evolving role of CISOs and senior cybersecurity executives

For this Cybersecurity Awareness Month, senior cybersecurity executives share their insights into the evolution of their roles.

by Nitansha Bansal

Cybersecurity Cybersecurity Standards and Requirements

Wed, Sep 4, 2024

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights

The Mythical Beasts project pulls back the curtain on the connections between 435 entities across forty-two countries in the global spyware market.

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Cybersecurity Proliferation of Offensive Cyber Capabilities

Wed, Sep 4, 2024

Mythical Beasts and Where to Find Them: Data and Methodology

Learn more about the methodology and dataset behind Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Cybersecurity Proliferation of Offensive Cyber Capabilities

Wed, Sep 4, 2024

Mythical Beasts and Where to Find Them

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights is concerned with the commercial market for spyware and provides data on market participants.

by Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Cybersecurity Proliferation of Offensive Cyber Capabilities

Mon, Aug 19, 2024

AI in Cyber and Software Security:  What’s Driving Opportunities and Risks?

This issue brief discusses the drivers of evolving risks and opportunities presented by generative artificial intelligence (GAI), particularly in cybersecurity, while acknowledging the broader implications for policymakers and for national security.

by Maia Hamin, Jennifer Lin, Trey Herr

Artificial Intelligence Cybersecurity
CSI Russian Tech Isolation

Mon, Jul 29, 2024

Russia’s Digital Tech Isolationism: Domestic Innovation, Digital Fragmentation, and the Kremlin’s Push to Replace Western Digital Technology 

Russia’s technological isolation is both a reality and a desired goal for Moscow. This piece explores the impacts of this phenomenon and offers recommendations for how to deal with that evolving digital ecosystem.

by Justin Sherman

Cybersecurity Internet

Wed, Jul 24, 2024

OT Cyber Policy: The Titanic or the Iceberg

Current policy does not address the issue of cyber-physical security with a systemic approach, instead focusing with tunnel vision on specific events. This analysis uses the iceberg model for systems thinking to address policy gaps in the OT ecosystem, detailing recommendations for the Cybersecurity and Infrastructure Security Agency (CISA).

by Danielle Jablanski

Critical Infrastructure Policy Operational Technology

Mon, Jul 1, 2024

The Impact of Corruption on Cybersecurity: Rethinking National Strategies Across the Global South  

As the Global South prepares for the next stage in ICT development, governments must prioritize policies that reduce corruption in critical network software procurement to protect those countries' developing cyberspace.

by Robert Peacock

Corruption Cyber Strategy

Mon, Jun 24, 2024

User in the Middle: An Interoperability and Security Guide for Policymakers

When technologies work together, it benefits users and the digital ecosystem. Policymakers can advance interoperability and security in tandem by understanding how each impacts the other.

by Maia Hamin, Alphaeus Hanson

Cybersecurity Cybersecurity Standards and Requirements