Virtual Library

Our virtual library is an online repository of all of the reports, papers, and briefings that IST has produced, as well as works that have influenced our thinking.

Submit your Content

Reports

Securing the Signal: Mitigation Strategies to Strengthen Crisis Communication Channels

Christian Steins

viewpdf

Reports

Strengthening Nuclear Crisis Communications: Steps to Implement Mesh Networks to Enhance Resilience & Security

Christian Steins

viewpdf

Reports

Enhancing Cyber Resilience through Insurance: Revisiting Anti-Bundling Regulation

Sophia Mauro and Taylor Grossman

viewpdf

Op-ed

ROOST Reminds Us Why Open Source Tools Matter

view

Reports

Navigating AI Compliance, Part 2: Risk Mitigation Strategies for Safeguarding Against Future Failures

Mariami Tkeshelashvili, Tiffany Saade

viewpdf

Reports

Deterring the Abuse of U.S. IaaS Products: Recommendations for a Consortium Approach

Steve Kelly, Tiffany Saade

viewpdf

Podcasts

TechnologIST Talks: Looking Back and Looking Ahead: Deep Dive on the New Cybersecurity Executive Order

Carole House, Megan Stifel, and Steve Kelly

view

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

TechnologIST Talks: Looking Back and Looking Ahead: Deep Dive on the New Cybersecurity Executive Order

Carole House, Megan Stifel, and Steve Kelly

SUMMARY

On January 16, 2025, the Biden administration released the capstone Executive Order “Strengthening and Promoting Innovation in the Nation’s Cybersecurity.” In this bonus episode of TechnologIST Talks, Chief Strategy Officer Megan Stifel and Chief Trust Officer Steve Kelly are joined by Carole House, Special Advisor for Cybersecurity and Critical Infrastructure Policy at the National Security Council and a member of the office responsible for leading the drafting of the EO. Megan, Steve, and Carole walk through the main components of the order, talking about its implications for federal systems security, quantum, efforts to tackle cybercrime and fraud, and more. 

“Software is such a prevalent root cause of so many of the supply chain attacks that we’re seeing and that have been occurring. It’s the next step of evolution. We are requiring software vendors to provide verifiable attestations of those software practices,” Carole said.

What prompted the drafting and release of this Executive Order? How does the EO address ransomware? And what should government–and industry–take away from its provisions? Join us for this and more on this episode of TechnologIST Talks.