Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
cybersecurity
Event
March 13, 2026 12:00 pm
The Fight Comes to Our Shores: Breaking Down the Cyber Attack on Stryker
On Wednesday, March 11, a pro-Iran hacking group claimed to have wiped 200,000 devices of a major U.S. medical device manufacturer. What do we know about what happened, and who carried out this destructive attack? How should policymakers and critical infrastructure owners and operators respond?
critical infrastructure
,
cyber
,
cyber operations
,
cybersecurity
,
Iran
,
medical device
March 12, 2026
Blog
IST Experts Weigh in on the 2026 Cyber Strategy
Today’s Cyber Strategy for America outlined six key priorities for the administration’s “cyber vision.” IST experts weigh in on what’s there, what isn’t, and what the plan means for cybersecurity going forward.
critical infrastructure
,
cyber offense
,
cybersecurity
,
deterrence
,
National Cybersecurity Strategy
,
Strategy
,
White House
March 6, 2026
Blog
Reflecting on the Munich Cybersecurity Conference Roller Coaster: Digital Sovereignty, Decoupling, and the Risks and Opportunities of AI
IST Chief Strategy Officer Megan Stifel visited Germany in February to join cybersecurity experts from around the globe at the Munich Cyber Security Conference. From digital sovereignty to the risks and opportunities of AI, she reflects on her experience for the NatSpecs blog.
artificial intelligence
,
cybersecurity
,
decoupling
,
digital sovereignty
,
Munich
,
transatlantic
March 5, 2026
Podcast
Episode 50: Systems Engineering for Survival: A Physician’s Guide to Emergency Management
Bryson Bort welcomes Dr. Natalie Sullivan, Medical Director of the Emergency Response Medical Group and an emergency medicine physician at a D.C. area hospital. Trained in EMS and disaster and operational medicine, Natalie turned her attention to the critical intersection of clinical medicine, patient safety, and cybersecurity resilience after experiencing a prolonged ransomware attack on a major hospital.
critical infrastructure
,
cybersecurity
,
emergency management
,
emergency systems management
,
resilience
,
UnDisruptable27
February 17, 2026
Blog
Active Defense, the Congressional Agenda, Teen Hackers, and Critical Infrastructure Resilience: IST at RSA
IST will once again join the global community of cyber experts in convening in San Francisco for RSAC this March! From active defense, to the congressional agenda, to stopping teen hackers, the IST team and adjuncts will tackle complex issues across sectors.
AI
,
artificial inteligence
,
critical infrastructure
,
cyber
,
cyber attacks
,
Cyber Civil Defense
,
cybersecurity
,
Ransomware
,
resilience
,
RSA
January 28, 2026
Podcast
Episode 49: Bridging the IT/OT Divide in Oil and Gas
Bryson Bort is joined by Dd Budiharto, Microsoft’s Customer Security Officer for the Oil, Gas, and Energy sectors, as she shares her experience bridging the IT/OT divide in the energy sector.
CISO
,
cybersecurity
,
energy
,
gas
,
IT
,
oil
,
OT
January 20, 2026
Podcast
Episode 48: AI and the Future of Maritime Cybersecurity
In a new episode of the ICS Village and IST podcast Hack the Plan[e]t, retired maritime cybersecurity professor Gary Kessler joins Bryson Bort to walk us through the ins and outs of cybersecurity at sea, automated identification systems, and AI’s current and future role in maritime operations. What is AIS spoofing, and why is it dangerous? What are the unique challenges posed by cybersecurity at sea? Is the maritime industry ready for artificial intelligence integrations?
critical resilience
,
cyber
,
cybersecurity
,
martime
December 16, 2025
Blog
IST Contributes to the International Counter Ransomware Initiative Summit for the Fourth Consecutive Year: Exercises, Workshops, and Private Sector Advisory Panel
Over the last four years, IST has been a critical partner to the International Counter Ransomware Initiative's coalition of governments and other key partners in their effort to coordinate global actions against ransomware. This October, IST’s Steve Kelly, Elizabeth Vish, and Gigi Flores Bustamante joined the CRI’s fifth summit in Singapore to deliver IST’s research on public-private partnerships to combat cybercrime.
counter ransomware initiative
,
critical infrastructure
,
cybersecurity
,
international collaboration
,
Public-private partnerships
,
Ransomware
,
Singapore
,
TTX
December 10, 2025
In the News
,
Op-ed
F5, SolarWinds, and the Lethargy of the FAR Council
Sources say the next national cyber strategy will address federal procurement, but secure-by-demand rules have been stuck at the FAR Council since 2022. For Lawfare, IST Senior VP Nick Leiserson argues that stopping procurement regulation vaporware is key.
cybersecurity
,
F5
,
FAR
,
Federal Acquisision Regulatory Council
,
procurement
,
secure by demand
,
SolarWinds
December 4, 2025
Report
Fighting Cyber-Enabled Fraud: A Systemic Defense Approach
Phishing and cyber-enabled fraud are escalating global threats affecting users, consumers, organizations and countries alike. A new white paper, developed by the World Economic Forum’s Partnership against Cybercrime in collaboration with IST, presents a systemic defense framework to confront this challenge.
cybersecurity
,
DNS
,
fraud
,
ICANN
,
phishing
,
systemic defense
,
WEF
December 2, 2025
Op-ed
Scaling Disruption: What the Next Cyber Strategy Must Get Right
What should be prioritized in the White House’s forthcoming National Cyber Strategy? In an op-ed for Claroty Nexus, Megan Stifel outlined what the next strategy must get right in order to safeguard citizens and maintain America's global leadership.
cybersecurity
,
disruption
,
National Cybersecurity Strategy
,
operational collaboration
,
PPPs
,
Public-private partnerships
,
White House
December 2, 2025
Blog
Giving Tuesday 2025: IST’s Impact
Every day, the work we do at IST makes a difference, from driving Congress to consider new approaches to intractable problems, to bringing national security leaders together to ensure they consider the existential threat of AI, to arming K-12 schools with the tools they need to defend against ransomware. As a 501(c)(3) nonprofit, this is only possible because of the generous support of our partners and donors.
AI
,
artificial intelligence
,
critical infrastructure
,
cybersecurity
,
Giving Tuesday
,
national security
,
Ransomware
December 2, 2025
In the News
,
Podcast
Cyber Threats to Water Infrastructure: Insights from Josh Corman
IST Executive in Residence for Public Safety & Resilience Josh Corman joined host Paul Roberts on The Security Ledger podcast to discuss what UnDisruptable27 is doing to mitigate the cyber threats facing small and local water utilities.
critical infrastructure
,
cybersecurity
,
Volt Typhoon
,
water utility
November 26, 2025
Blog
Cybersecurity Awareness Month at IST: Spotlighting our cyber efforts across borders, at the intersection of AI, and throughout sectors
As technologies evolve across the world, so do cyber threats. For Cybersecurity Awareness Month, the Institute for Security and Technology shares practical resources, novel research, and critical insights from IST’s cadre of experts to help individuals, organizations, and communities strengthen their cybersecurity practices.
artificial intelligence
,
cybersecurity
,
K-12 Cyber Defense Coalition
,
Ransomware
,
Ransomware Task Force
,
UnDisruptable27
November 17, 2025
Blog
A Category Three Cyber Hurricane: Classifying the JLR Hack
Ransomware attacks have plagued the UK this year. But in its first year, the independent Cyber Monitoring Centre is providing transparent, impartial incident assessments, modeled on natural disaster severity scales, to quickly inform the ecosystem in the wake of an attack. In a new blog post, IST Senior Vice President for Policy Nicholas Leiserson unpacks the program and calls on policymakers in the U.S. and beyond to franchise the model.
congress
,
cyber insurance
,
cybersecurity
,
metrics
November 12, 2025
Blog
Governance and Cyber Risk for SMEs: Remapping the Blueprint for Ransomware Defense
In 2022, the Ransomware Task Force developed the Blueprint for Ransomware Defense to provide SMEs with an actionable framework to defend against the most common attacks, aligning with NIST’s Cybersecurity Framework 1.0. Today, IST releases the Blueprint remapped to the NIST Cybersecurity Framework 2.0, incorporating a new core function and updating key considerations for the most vulnerable SMEs.
blueprint
,
cybersecurity
,
defense
,
governance
,
Ransomware
,
SMEs
,
Take9
November 6, 2025
Previous
Page
1
Page
2
Page
3
Page
4
Page
5
Next
Search
Search
Home
About
CATALINK BRIEF
FAQ
Our Team
Why do we need crisis communications?
Activities
Events
Insights
Podcasts
Press
Get In Touch