Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Analysis
Explore our research
Search
Filters
Analysis Type
Pillar / Project
Source
Topics
Author
Year
Report
Blueprint for Ransomware Defense: An Action Plan for Ransomware Mitigation, Response, and Recovery for Small- and Medium-Sized Enterprises
In response to Action 3.1.1 of the Ransomware Task Force (RTF) report, which calls for the cybersecurity community to “develop a clear, actionable framework for ransomware mitigation, response, and recovery,” the Blueprint for Ransomware Defense Working Group developed a Blueprint comprised of a curated subset of essential cyber hygiene Safeguards from the Center for Internet Security Critical Security Controls® (CIS Controls®) v8.
blueprint
,
Blueprint for Ransomware Defense
,
cyber attacks
,
defense
,
Future of Digital Security
,
Ransomware
,
RTF
August 3, 2022
Report
Playing Telephone: Hoax Calls and the Insecurity of Leader to Leader Communications
A database of hoax calls between leaders that illustrates the importance of secure, trusted crisis communications.
Innovation and Catastrophic Risk
July 20, 2022
Report
Atlas of Crisis Communications: Nuclear States
Leah Walker and Andrew Facini present an atlas of hotlines between states with nuclear weapons, part of IST’s work efforts to reinvigorate broader nuclear crisis control through research and development aimed at identifying and solving practical nuclear risk reduction gaps.
atlas
,
CATALINK
,
crisis communications
,
hotline
,
Innovation and Catastrophic Risk
,
nuclear risk reduction
July 18, 2022
Testimony
Testimony: Rising Threats: Ransomware Attacks and Ransom Payments, Enabled by Cryptocurrency
On June 7, 2022, IST Chief Strategy Officer Megan Stifel testified in front of the U.S. Senate Committee on Homeland Security and Governmental Affairs for the hearing entitled, "Rising Threats: Ransomware Attacks and Ransom Payments, Enabled by Cryptocurrency."
blueprint
,
cryptocurrency
,
cybersecurity
,
ransom payments
,
Ransomware
June 7, 2022
Progress Report
The Ransomware Task Force: One Year On
In the year since the publication of the RTF report, the Ransomware Task Force reflects on progrsss, noting a great deal of action to combat ransomware and a continued rise observed incidents. This summary briefly discusses some of the ransomware-related activity of the last year, its impact, the current threat level, and the RTF's recommendations for moving forward.
cyber attacks
,
deter
,
disrupt
,
Future of Digital Security
,
prepare
,
Ransomware
,
respond
,
RTF
May 8, 2022
In the News
,
Podcast
The Lawfare Podcast: Cybersecurity and Ukraine
Megan Stifel joined the Lawfare Podcast to discuss the importance of cybersecurity in the war in Ukraine.
cybersecurity
,
Ukraine
May 3, 2022
Previous
Page
1
…
Page
15
Page
16
Page
17
Page
18
Page
19
…
Page
29
Next
Fact Sheet
White House Releases Outbound Investment Executive Order
Strategic Balancing Initiative Fact Sheet: On Wednesday, August 9, 2023, the White House released an Executive Order (EO) on Addressing United States Investments in Certain National Security Technologies and Products in Countries of Concern, laying the groundwork for the development of a U.S. Outbound Investment Program.
techno-industrial competition
,
outbound investment
,
Department of the Treasury
AAR
,
Report
Strengthening Resilience in 21st Century Crisis Communications
In Strengthening Resilience in 21st Century Crisis Communications, authors Alexa Wehsener and Sylvia Mishra draw on insight from a group of high-level policymakers, diplomats, and technical experts in attendance at IST's London workshop earlier this year to examine the vulnerabilities of existing crisis communications channels and offer possible solutions.
nuclear
,
CATALINK
,
nuclear risk reduction
,
diplomacy
,
after action report
Fact Sheet
DoD Releases the National Defense Science and Technology Strategy
Bottom Line: On Tuesday, May 9, 2023, DoD released the NDSTS, expanding on what the 2022 National Defense Strategy (NDS) calls America’s “asymmetric advantages” in fourteen “critical technology areas.”
DOD
,
critical technologies
,
National Defense Strategy
Report
Mapping Threat Actor Behavior in the Ransomware Payment Ecosystem: A Mini-Pilot
This mini-pilot overlays actual threat actor behavior on the original ransomware payment ecosystem map. It seeks to identify which kinds of disruption could be the most effective and where to apply them in the payment process.
cybersecurity
,
Ransomware
,
ransom payments
,
mini pilot
Search
Search
CATALINK
Home
About
CATALINK BRIEF
FAQ
Our Team
Why do we need crisis communications?
Activities
Events
Insights
Podcasts
Press
Get In Touch