Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
information sharing
AAR
,
Report
Counter Ransomware Initiative Tabletop Exercise: After-Action Report
IST, in partnership with the Australian Department of Home Affairs and the Counter Ransomware Initiative’s Private Sector Advisory Panel—led by Public Safety Canada and BlackBerry—held a multinational ransomware tabletop exercise on the margins of Singapore International Cyber Week and the Fifth CRI Summit. A new after action report summarizes the discussion and presents 3 key takeaways.
coordination
,
counter ransomware initiative
,
cyber
,
cybersecurity
,
disruption
,
information sharing
,
operational collaboration
,
Ransomware
,
Singapore
,
tabletop exercise
March 31, 2026
In the News
,
Op-ed
Reauthorization of CISA ’15: 10 Years Later, New Threats, Exigent Urgency
In an op-ed for Claroty Nexus, IST Chief Strategy Officer Megan Stifel calls on Congress to reauthorize the Cybersecurity Information Sharing Act of 2015 (CISA ’15), which improves and incentivizes the sharing of cyber threat indicators and information about defensive measures taken against cyber threats between public and private sectors.
CISA 15
,
congress
,
cybersecurity
,
information sharing
,
public-private collaboration
September 15, 2025
AAR
,
Report
Exercise VEIL STORM I: After Action Report
In partnership with Europol, the Institute for Security and Technology and the Ransomware Task Force’s International Engagement Working Group designed and delivered Exercise VEIL STORM I, a tabletop exercise focused on operational collaboration across international law enforcement agencies and private sector firms in responding to cyber incidents. This after-action report summarizes the proceedings and key takeaways of the exercise.
cyber insurance
,
cybersecurity
,
disruption
,
Europol
,
information sharing
,
operational collaboration
,
public-private collaboration
,
Public-private partnerships
,
Ransomware
July 23, 2025
Blog
Defragging Trust & Safety: Cross-Platform Collaboration at TrustCon 2025
While malicious actors exploit vulnerabilities across the digital landscape, Trust & Safety teams often operate in silos, unable to share information or coordinate responses with those who are fighting the same fight. At #TrustCon2025, IST and Twitch will co-host a roundtable discussion to bridge these divides and establish pathways toward meaningful, practical cooperation. IST Ecosystem Trust & Safety Associate Fatima Faisal Khan previews the roundtable.
information sharing
,
ISAC
,
safety
,
trust
,
TrustCon
July 21, 2025
Blog
Hit ‘Em Where it Hurts: Understanding and Disrupting the Resourcing Phase in the Ransomware Payment Ecosystem
Since April 2021, IST’s #RansomwareTaskForce has investigated how to disrupt the infrastructure that ransomware groups rely on to receive payments. Writing for the #NatSpecs blog, Trevaughn Smith presents new strategies for targeting the resourcing phase of the #ransomware ecosystem.
blockchain
,
bulletproof hosting
,
cryptocurrency
,
information sharing
,
RaaS
,
Ransomware
,
resourcing
March 17, 2025
Blog
Cracked and Nulled: International Law Enforcement Takes Down Two of the World’s Largest Cybercrime Forums
In a recent victory against cybercrime, international law enforcement agencies jointly announced in January the successful disruption of Cracked and Nulled, two of the world’s largest cybercrime forums. IST Future of Digital Security Associate Gigi Flores Bustamante breaks down key actions and the operation’s strategic approach to disrupting ransomware.
cybercrime
,
disruption
,
FBI
,
information sharing
,
infrastructure
,
public-private collaboration
,
Ransomware
March 10, 2025
Search
Search
MENU
HOME PAGE
About
FAQ
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe