Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
defense
Blog
Governance and Cyber Risk for SMEs: Remapping the Blueprint for Ransomware Defense
In 2022, the Ransomware Task Force developed the Blueprint for Ransomware Defense to provide SMEs with an actionable framework to defend against the most common attacks, aligning with NIST’s Cybersecurity Framework 1.0. Today, IST releases the Blueprint remapped to the NIST Cybersecurity Framework 2.0, incorporating a new core function and updating key considerations for the most vulnerable SMEs.
blueprint
,
cybersecurity
,
defense
,
governance
,
Ransomware
,
SMEs
,
Take9
November 6, 2025
Report
Plano de ação de defesa contra o ransomware
Plano de ação para as pequenas e médias empresas em matéria de mitigação, resposta e recuperação de programas de sequestro de dados
Blueprint for Ransomware Defense
,
cyber attacks
,
defense
,
Future of Digital Security
,
Portuguese
,
Ransomware
,
RTF
September 24, 2024
Report
Plan maestro de defensa contra los programas de secuestro
En respuesta a la acción 3.1.1 del Informe del Grupo de Trabajo sobre Programas de Secuestro, en la cual se exhorta a las organizaciones de ciberseguridad a establecer un marco claro y accionable para la mitigación, la respuesta y la recuperación ante programas de secuestro, el Grupo de Trabajo encargado de elaborar un plan de defensa contra los programas de secuestro formuló un plan maestro que abarca un subconjunto de salvaguardias esenciales de ciberhigiene seleccionadas de los controles críticos de seguridad del Centro para la Seguridad de Internet (CIS Controls®) v8.
Blueprint for Ransomware Defense
,
cyber attacks
,
defense
,
Future of Digital Security
,
Ransomware
,
RTF
November 10, 2022
Report
Blueprint for Ransomware Defense: An Action Plan for Ransomware Mitigation, Response, and Recovery for Small- and Medium-Sized Enterprises
In response to Action 3.1.1 of the Ransomware Task Force (RTF) report, which calls for the cybersecurity community to “develop a clear, actionable framework for ransomware mitigation, response, and recovery,” the Blueprint for Ransomware Defense Working Group developed a Blueprint comprised of a curated subset of essential cyber hygiene Safeguards from the Center for Internet Security Critical Security Controls® (CIS Controls®) v8.
blueprint
,
Blueprint for Ransomware Defense
,
cyber attacks
,
defense
,
Future of Digital Security
,
Ransomware
,
RTF
August 3, 2022
Report
Command and Control of Nuclear Weapons in India
M.V. Ramana and Lauren Borja analyze the state of nuclear command and control in India, concluding that the state of Indian NC3 “has been shaped by an ongoing rivalry between civilian authorities and the military."
accident
,
communication
,
control
,
decision-making
,
defense
,
delivery vehicle
,
deterrence
,
early warning
,
India
,
military
,
NC3
,
nuclear
,
Pakistan
,
stability
,
submarine
,
survivability
,
United States
,
wargaming
August 1, 2019
Report
For Better or for Worse: The Future of C3I Entanglement
James Acton evaluates the risk of inadvertent escalation arising from attacks on dual-use (nuclear and conventional warfare) command, control, communication, and intelligence (C3I) capabilities in a conventional war because such attacks would degrade the target’s nuclear command-and-control system.
anti-satellite
,
ballistic missile
,
boost-glide
,
C3I
,
capabilities
,
cyber
,
defense
,
dyad
,
early warning
,
geopolitical
,
high-precision munition
,
hypersonic
,
incidental attacks
,
intelligence
,
launch under attack
,
military
,
nuclear
,
orbits
,
radar
,
stability
,
strategic
,
war
,
warfighting
November 21, 2019
Search
Search
MENU
HOME PAGE
About
FAQ
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe