Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
critical infrastructure
Podcast
Episode 37: The Case For A Cyber Force
In this episode, Bryson sits down with Mark Montgomery, Senior Director at the Foundation for Defense of Democracies. For three years, Mark served as Executive Director of the Cyberspace Solarium Commission, created by congressional mandate to develop strategic approaches to defending against cyber attacks. Now, he directs CSC 2.0, an initiative that works to implement the recommendations of the Commission.
critical infrastructure
,
CYBERCOM
,
Cyberspace Solarium Commission
,
force generation
July 23, 2024
Blog
Institute for Security and Technology and Cyber Threat Alliance Submit Comments on Cyber Incident Reporting for Critical Infrastructure Act
IST and the Cyber Threat Alliance, along with co-signer Chainalysis, submitted comments on July 3, 2024 in response to the Cybersecurity and Infrastructure Security Agency’s Notice of Proposed Rulemaking on the Cyber Incident Reporting for Critical Infrastructure Act.
CIRCIA
,
critical infrastructure
,
cybersecurity
,
incident reporting
,
Ransomware
,
RFI
July 3, 2024
Podcast
Episode 36: Supporting Ukrainian Electrical Grid Resilience in Wartime
Joe Marshall is a Senior IoT Security Strategist at Cisco Talos Intelligence Group. When Russia invaded Ukraine in 2022, Joe helped coordinate a multinational, multi-company coalition of volunteers and experts to find a technological solution. Bryson and Joe sat down to discuss his efforts in Ukraine, how he got the go-ahead from Cisco leadership, and more.
critical infrastructure
,
GPS
,
grid security
,
Ukraine
June 21, 2024
Event
May 30, 2024 10:00 am
Hack the Capitol 7.0
Hack the Capitol 7.0 took place in May 2024 in Washington, DC and featured 2 days of policy, strategy, and governance-focused panels and presentations, individual deep dives on corporate, legal, regulatory, technical, or operational details, and talks dedicated to peer-to-peer information sharing.
critical infrastructure
,
cybersecurity
,
hackers
,
ICS
,
Industrial Control Systems
,
OT
May 31, 2024
Testimony
Testimony: Red Alert: Countering the Cyberthreat from China
On May 15, 2024, Chief Trust Officer Steve Kelly testified before the House Committee on Oversight and Accountability Subcommittee on Cybersecurity, Information Technology, and Government Innovation in a hearing entitled, "Red Alert: Countering the Cyberthreat from China."
China
,
critical infrastructure
,
cybersecurity
May 28, 2024
Podcast
Episode 35: Preparing for the potential worst day
In this episode, Bryson Bort is joined by Paul Shaver, Global OT Security Practice Lead at Mandiant / Google Cloud to discuss the cyber threat landscape. How did Paul’s military background play a role in his decision to start working with control systems? What is the difference between an advanced persistent threat and a regular threat? What does Paul think is the best way to protect against documented threats from nation-state actors?
advanced persistent threat
,
critical infrastructure
,
cyber resilience
,
cybersecurity
May 21, 2024
Blog
IST Statement on President Biden’s National Security Memorandum on Critical Infrastructure Security and Resilience
The Institute for Security and Technology (IST) commends the Biden-Harris Administration for this week releasing its National Security Memorandum (NSM) 22 on Critical Infrastructure Security and Resilience. IST offers the following observations and reflections on NSM-22.
critical infrastructure
,
cybersecurity
,
national security
,
NSM-22
May 1, 2024
Podcast
Episode 34: The ICS Hacker
In this episode of Hack the Plan[e]t, Bryson Bort sits down with Claroty director of research and industrial control system (ICS) vulnerability expert Sharon Brizinov to discuss everything ICS. What are the most common vulnerabilities threatening ICS security? What’s the impact of cybersecurity controls standardization? And if he could wave a magic wand, what is one thing he’d change in the ICS industry?
critical infrastructure
,
Industrial Control Systems
,
internet of things
,
Operational Technology
April 23, 2024
Blog
The Hill: The future of clean energy hinges on cybersecurity
For The Hill, IST’s Steve Kelly & CLTC Berkeley’s Sarah Powazek tackle the cybersecurity of clean energy. “As the energy grid evolves to accommodate clean electricity…the cybersecurity of these distributed technologies must evolve with it,” they write.
China
,
CISA
,
clean energy
,
critical infrastructure
,
cybersecurity
April 23, 2024
Podcast
Episode 33: Securing, Defending, and Bringing Resilience to Infrastructure with Robert Shaughnessy
In this episode of Hack the Plant, Bryson sits down with Psymetis CEO Robert Shaughnessy to discuss his work with Psymetis, an Operational Technology security company that works on critical infrastructure; challenges to innovation in the private sector; and the role of government in developing new technologies.
China
,
critical infrastructure
,
electricity
,
Operational Technology
February 28, 2024
Podcast
Episode 32: CISA’s Critical Infrastructure Protection Mission with Jen Easterly
In this episode of Hack the Plant, Bryson sits down with CISA Director Jen Easterly to discuss her work on leading CISA’s critical infrastructure mission, implementing efforts to make products Secure by Design, and working with private companies to combat ransomware.
CISA
,
critical infrastructure
,
cyber
,
Ransomware
February 2, 2024
Blog
IST Statement on President Biden’s Artificial Intelligence Executive Order
IST commends the Biden-Harris Administration for this week releasing its Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence. IST looks forward to playing a catalyzing role in helping identify gaps, shape solutions, and inform the intense work that still needs to be done.
AI foundation models
,
critical infrastructure
,
Executive Order
,
Infrastructure-as-a-Service
,
open-source
November 1, 2023
Blog
IST Heads to Vegas for “Hacker Summer Camp”
From August 8 to the 13, IST team members and adjunct advisors will be participating in and attending Hacker Summer Camp in Las Vegas.
BSides
,
critical infrastructure
,
DefCon
,
hacker
,
summer camp
August 8, 2023
Report
NC3 Insider Threats
Ron Schouten examines fundamental concepts of insider threats and provides an overview of the extent and significance of insider threats in US and other NC3 systems.
Bystander Effect
,
capability
,
chemical
,
civilian
,
classified materials
,
critical infrastructure
,
deterrence
,
espionage
,
IAEA
,
information systems
,
insider threat
,
NC3
,
nuclear
,
organizational culture
,
stability
,
threat
,
vulnerability
November 14, 2019
Report
Glass Nations, Glass People
Complex physical and societal infrastructures in democratic societies are becoming increasingly vulnerable. While physical infrastructure works to support the population, its design criteria is inherently a result of social planning processes. As advanced and powerful technologies rapidly diffuse, operating these tools often requires minimal resources and/or technical expertise.
critical infrastructure
,
digitally impaired cognition
,
infrastructure
,
internet of things
,
reality apathy
,
resilience
June 17, 2020
Previous
Page
1
Page
2
Page
3
Page
4
Next
Search
Search
MENU
HOME PAGE
About
FAQ
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe