Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
Virtual Webinar
Event
July 18, 2023 3:00 pm
Castles Built on Sand: Digging into the Foundation | Towards Securing the Open-Source Software Ecosystem
On July 18, 2023 Politico’s John Sakellariadis moderated a conversation with the authors of Castles Built on Sand to dig into the foundation of our recommendations to secure the open-source software ecosystem.
Log4j
,
open source software
,
software security
,
vulnerability management
July 18, 2023
Event
February 24, 2023 2:00 pm
Under Control: How technology is shaping DoD’s approach to autonomous weapons
On February 22, 2023, IST hosted a discussion with Dr. Michael Horowitz, Director of the Emerging Capabilities Policy Office at the Pentagon in conversation with Dr. Alice Hunt Friend, IST’s VP for Research and Analysis.
autonomous weapon systems
,
autonomy
,
Department of Defense
,
emerging capabilities
February 24, 2023
Event
November 30, 2022 1:00 pm
Cyber Resilience and Insurance Innovation
With the rise in volume and sophistication of ransomware, insurance companies and their insureds struggle with how to respond. This has driven new underwriting requirements and price changes but also innovation. On November 22, 2022, the Ransomware Task Force hosted the fifth webinar in the Blueprint for Ransomware Defense webinar series.
Blueprint for Ransomware Defense
,
cyber insurance
,
cybersecurity
,
Ransomware
,
resilience
November 30, 2022
Event
November 16, 2022 10:00 am
Averting Catastrophe: Walking the Talk on Nuclear Risk Reduction and Crisis Communications
How can states build greater transparency and predictability to prevent or manage crises when prevention fails? On November 16, 2022, IST hosted a conversation with experts to share Chinese and Russian perspectives on nuclear risks.
China
,
nuclear crisis communications
,
nuclear risk reduction
,
Russia
November 16, 2022
Event
November 15, 2022 1:00 pm
Actionable Safeguards: Containing and Recovering from Ransomware Attacks
After a ransomware attack occurs, what comes next? On November 15, 2022, the Ransomware Task Force hosted the fourth webinar in the Blueprint for Ransomware Defense series, which seeks to help you get your business back up and running quickly in the aftermath of an attack.
actionable safeguards
,
Blueprint for Ransomware Defense
,
data recovery
,
incident response
,
ransomware recovery
November 15, 2022
Event
November 9, 2022 10:00 am
Actionable Safeguards: Protecting your organization
Now that you’ve inventoried your assets and built a strong foundation for protecting your devices, network, and people, it’s time to add the next layer of Safeguards. On November 9, 2022, the Ransomware Task Force hosted the third webinar in the Blueprint for Ransomware Defense webinar series.
access control gaps
,
actionable safeguards
,
Blueprint for Ransomware Defense
,
misconfigurations
November 9, 2022
Event
November 1, 2022 1:00 pm
Foundational Safeguards: Building resilience in the face of a ransomware attack
If a ransomware attack should occur, are you prepared to respond? On November 1, 2022, the Ransomware Task Force hosted for the second webinar in the Blueprint for Ransomware Defense webinar series.
Blueprint for Ransomware Defense
,
foundational safeguards
,
resilience
,
respond
November 1, 2022
Event
October 25, 2022 1:00 pm
Foundational Safeguards: Tips and tricks for building your cybersecurity foundation
Foundational Safeguards are the building blocks necessary to establishing an enterprise’s cyber security program. How can you use them to level up your enterprise’s protections? On October 25, 2022, the Ransomware Task Force hosted the first webinar in the Blueprint for Ransomware Defense webinar series.
Blueprint for Ransomware Defense
,
cybersecurity
,
foundational safeguards
,
resilience
October 25, 2022
Event
October 19, 2022 11:00 am
Securing Data Flows: The Importance of an EU-U.S. Agreement on Data Transfers
In a conversation moderated by IST’s Megan Stifel, David Kris, founder at Culper Partners LLC, Anitha Ibrahim, Senior Manager for Cybersecurity & Data Protection Policy at Amazon Web Services, and Peter Swire, professor in the School of Cybersecurity and Privacy at the Georgia Institute of Technology, unpacked the new Executive Order on Enhancing Safeguards for United States Signals Intelligence Activities and its impact on EU-U.S. data flows.
EO
,
European Court of Justice
,
surveillance
,
transatlantic data flows
October 19, 2022
Event
May 11, 2022 1:00 pm
Hacking in Plain Sight: Offensive Cyber Operations in the Russo-Ukrainian War
On May 11, 2022, IST hosted the Army Cyber Institute’s Erica D. Lonergan, Stairwell’s Silas Cutler, Okta’s Marc Rogers, and IST’s Megan Stifel for a conversation about the range of cyber operations seen in the Russo-Ukrainian war, how each country responded, the implications for both countries, and what we can learn when it comes to modern cyber operations in wartime.
cyber operations
,
hacking
,
Russia
,
Ukraine
May 11, 2022
Event
April 28, 2022 1:00 pm
Russia’s AI Disconnect: The War in Ukraine and the Looming Collapse of Russia’s AI Industry
artificial intelligence
,
military AI
,
Russia
,
Ukraine
April 28, 2022
Event
March 29, 2022 12:00 pm
Iran, the JCPOA, and Holding Back a Breakout
After a year of negotiations on a renewed Iran nuclear deal, Washington and Tehran’s inability to finalize an agreed way forward remain a fulcrum of foreign policy discussions worldwide.
Iran
,
JCPOA
,
nuclear proliferation
,
nuclear weapons
March 29, 2022
Event
March 15, 2022 3:30 pm
North Korea, Testing, and the Failures of Containment
North Korea is undeniably a nuclear weapons power, having repeatedly demonstrated both its explosive technology and delivery systems—so what is Pyongyang trying to achieve with ongoing tests and provocations? With existential security seemingly on the line, is continued proliferation a give-in, or can new diplomatic approaches be found? And what can be expected in the decade to come?
North Korea
,
nuclear proliferation
,
nuclear weapons
March 15, 2022
Event
February 15, 2022 2:00 pm
Hedges, Technology, & the Future of Proliferation
When states seek to bolster their own security, they often consider some degree of nuclear weapons development along the way. More than just “sprinting for a bomb,” states have many paths and degrees of proliferation options available to them.
hedging
,
nuclear proliferation
,
nuclear weapons
February 15, 2022
Event
December 15, 2021 3:00 pm
Intervention or Cooperation? The Roles for Military and Law Enforcement in Combating Ransomware
What are the rules of engagement for law enforcement and the military in preparing for and responding to threat actors operating overseas, often in jurisdictions that lack the political will to effectively address ransomware actors? On December 15, 2021, IST's Megan Stifel moderated a conversation with Lauren Zabierek, Gavin Wilde, Gary Corn, and Dmitri Alperovitch on law enforcement and the military’s role in combating national-scale cyber threats.
cyber threats
,
law enforcement
,
military authorities
,
Ransomware
,
USCYBERCOM
December 15, 2021
Event
December 14, 2021 2:00 pm
Building for a Tech “Year of Action”: Reflections on The Summit for Democracy and Paths Forward
When it comes to technology’s role in democracy, what actions can be taken in the year ahead? On December 14, 2021, IST’s Vera Zakem hosted a timely post-Summit conversation with Twitter’s Nick Pickles, NDI’s Moira Whelan, and the Atlantic Council’s Rose Jackson on what can be built for the “year of action.”
democracy
,
internet freedom
,
Summit for Democracy
,
technology
December 14, 2021
Previous
Page
1
Page
2
Page
3
Page
4
Next
Search
Search
MENU
HOME PAGE
About CATALINK
CATALINK Frequently Asked Questions
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe