Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
cybersecurity
Blog
Announcing Finalists for the Second Annual Cyber Policy Awards™ presented by Microsoft
The Cyber Policy Awards™ organizing committee is pleased to announce selection of 24 finalists who are in contention to receive “The Atlas” trophy, chosen by an august panel of judges from across the cyber community. The winners in each category will be revealed and celebrated at a ceremony held on the evening of Thursday, February 6, 2025 at the U.S. Chamber of Commerce in Washington, DC.
Cyber Policy Awards
,
cybercrime
,
cybersecurity
January 9, 2025
Blog
Ransomware Task Force Announces New Funding and Partners for 2024 and Beyond
The Institute for Security and Technology’s Ransomware Task Force, now in its fourth year of action, is excited to welcome Zscaler and Mastercard as new supporters. In addition, for 2024, we are grateful for the sustaining support of Craig Newmark Philanthropies, AWS, Bank of America, Banco Santander, Microsoft, Palo Alto Networks, and the Global Forum on Cyber Expertise, with support from the Ministerio de Asuntos Exteriores, Unión Europea y Cooperación of the Kingdom of Spain and the Bureau of Cyberspace and Digital Policy of the United States Department of State.
cyber
,
Cyber Civil Defense
,
cybersecurity
,
funding
,
Ransomware
December 19, 2024
Podcast
The Offense-Defense Balance
In a special episode of TechnologIST Talks, CEO Philip Reiner hosts Heather Adkins, a 22-year Google veteran and founding member of the Google Security Team. She shares her take on the current threat landscape, where the U.S. government and the private sector might align, and more.
artificial intelligence
,
cyber threats
,
cybersecurity
December 19, 2024
Blog
IST Welcomes Microsoft as Presenting Partner for the Second Annual Cyber Policy Awards™
The Institute for Security and Technology (IST) is proud to announce Microsoft as the Presenting Partner for the upcoming Cyber Policy Awards™. The Second Annual Cyber Policy Awards™ presented by Microsoft will be held on the evening of Thursday, February 6, 2025 at the United States Chamber of Commerce in Washington, DC.
Cyber Policy Awards
,
cybersecurity
December 17, 2024
Report
Navigating AI Compliance, Part 1: Tracing Failure Patterns in History
What is the risk of compliance failure in AI foundation models, and how can it be mitigated? The AI Risk Reduction Initiative’s latest report analyzes the history of failures across industries in an effort to avoid future pitfalls, and offers practical frameworks and definitions for practitioners navigating the complex compliance landscape. The first of a two-part series, this report examines 11 case studies from AI-adjacent industries to identify three distinct failure categories: institutional, procedural, and performance.
artificial inteligence
,
compliance
,
cybersecurity
,
Future of Digital Security
December 10, 2024
Blog
Delivering results requires a critical action think tank
Our role as a 501(c)(3) critical action think tank has never been more crucial. As technology empowers us, it also brings incredible challenges. We help accelerate its benefits while keeping individuals, businesses, governments, and society safe from harm. On Giving Tuesday, we extend our sincere thanks to all of our supporters. Our work would not be possible without you. To celebrate, IST CEO Philip Reiner shares his reflections on the last year, our impact, and why what we do is so important.
artificial intelligence
,
critical action
,
critical infrastructure
,
cybersecurity
,
public-private
,
Ransomware
December 3, 2024
Podcast
Episode 39: Reliability and Risks of the North American Power Grid
This month on Hack the Plan[e]t, host Bryson Bort is joined by Sara Patrick, President and CEO at the Midwest Reliability Organization to learn more about the organization’s mission to identify and mitigate security risks facing the North American bulk power system.
critical infrastructure
,
cybersecurity
,
ICS
,
power grid
November 26, 2024
Blog
Cybersecurity Awareness Month at IST: Tips, Tricks, and Takes from the Team
Last month, we shared the IST team’s best tips, tricks, and takes in honor of Cybersecurity Awareness Month. IST Comms Associate Lillian Ilsley-Greene sat down with the team to get their insights on the most pressing cyber issues facing our world.
AI
,
cybersecurity
,
incentives
,
MFA
,
online safety
,
Ransomware
,
software
November 4, 2024
Blog
IST Experts Weigh in on President Biden’s Artificial Intelligence National Security Memorandum
We commend the Biden-Harris Administration for releasing its National Memorandum on Advancing the United States’ Leadership in Artificial Intelligence. IST has long supported the nation’s security priorities and technological objectives through our investigation into AI and machine learning in NC3, AI risk reduction, and AI in cybersecurity. We call for safe, secure, and trustworthy AI innovation.
artificial intelligence
,
cybersecurity
,
memorandum
,
national security
October 30, 2024
Blog
Q&A: IST at the International Counter Ransomware Initiative
In this month’s edition of The TechnologIST, we sat down with Ransomware Task Force colleagues Future of Digital Security Associate Trevaughn Smith, Deputy Director for Digital Security Taylor Grossman, Senior Director for International Cyber Engagement Elizabeth Vish, and Chief Strategy Officer and RTF Executive Director Megan Stifel to learn about the Ransomware Task Force's ongoing support for the International Counter Ransomware Initiative.
CRI
,
cybersecurity
,
Public-private partnerships
,
Ransomware
October 25, 2024
Blog
Cybersecurity and the Clean Energy Transition
The time to start preparing for a clean energy transition is now. In October, IST and the Berkeley Center for Long-Term Cybersecurity hosted an in person dialogue to discuss how cybersecurity can support a new renewable energy infrastructure.
cybersecurity
,
electricity
,
energy grid
,
energy security
October 22, 2024
Report
The Implications of Artificial Intelligence in Cybersecurity: Shifting the Offense-Defense Balance
Advances in AI present key cybersecurity opportunities, but how might malicious actors utilize the same technology? IST’s latest report investigates the state of existing and potential integrations of AI in cybersecurity based on our research & interviews with industry stakeholders and puts forward 7 priority recommendations.
agentic
,
AI
,
artificial intelligence
,
cyber
,
cybersecurity
,
deepfakes
,
offense-defense balance
,
software
October 10, 2024
Podcast
Episode 38: Securing Embedded Systems
In this episode of Hack the Plant, host Bryson Bort sits down with MITRE EMB3D co-founder Niyo Little Thunder Pearson. For nearly 20 years, Niyo has been at the forefront of protecting critical infrastructure systems. He previously led incident response for American Express, directing the company’s Security Operations Center during the LulzSec and Anonymous attacks, and worked to develop an adversarial cyber defense program for the nation’s third largest gas utility at ONE Gas Oklahoma. Now, Niyo has co-founded MITRE EMB3D, a groundbreaking global threat network aimed at enhancing the security of embedded devices.
critical infrastructure
,
cybersecurity
,
embedded systems
,
hacker
,
MITRE EMB3D
September 25, 2024
Blog
IST unveils new project, engages with White House at “Hacker Summer Camp”
The Institute for Security and Technology (IST)’s Steve Kelly and Josh Corman joined thousands of infosec experts, security professionals, journalists, government officials, and cyber enthusiasts at “hacker summer camp,” the cybersecurity conference trio of Black Hat, BSides, and DEF CON—amongst many other bespoke gatherings and meetings.
AI
,
BSIDESLV
,
critical infrastructure
,
cybersecurity
,
DEF CON
August 22, 2024
In the News
A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks
WIRED's Lily Hay Newman interviewed Josh Corman on the launch of UnDisruptable27. "A longtime critical infrastructure security researcher is launching a project to communicate with utility operators, municipalities, and regular people in creative ways about both urgency and optimism around protecting critical infrastructure now,” writes Newman.
BSides
,
China
,
critical infrastructure
,
cybersecurity
August 6, 2024
Blog
Institute for Security and Technology and Cyber Threat Alliance Submit Comments on Cyber Incident Reporting for Critical Infrastructure Act
IST and the Cyber Threat Alliance, along with co-signer Chainalysis, submitted comments on July 3, 2024 in response to the Cybersecurity and Infrastructure Security Agency’s Notice of Proposed Rulemaking on the Cyber Incident Reporting for Critical Infrastructure Act.
CIRCIA
,
critical infrastructure
,
cybersecurity
,
incident reporting
,
Ransomware
,
RFI
July 3, 2024
Previous
Page
1
Page
2
Page
3
Page
4
Page
5
Next
Search
Search
MENU
HOME PAGE
About
FAQ
Our Team
Insights
Events
Analysis
Podcasts
The CATALINK Brief
Why crisis communications?
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe