Virtual Library

Our virtual library is an online repository of all of the reports, papers, and briefings that IST has produced, as well as works that have influenced our thinking.

Submit your Content

Reports

Why Venture Capital Is Indispensable for U.S. Industrial Strategy: Activating Investors to Realize Disruptive National Capabilities

Michael Brown and Pavneet Singh

viewpdf

Reports

The Implications of Artificial Intelligence in Cybersecurity: Shifting the Offense-Defense Balance

Jennifer Tang, Tiffany Saade, Steve Kelly

viewpdf

Fact Sheet

IST’s Efforts in the Age of AI: An Overview

viewpdf

Reports

Unlocking U.S. Technological Competitiveness: Proposing Solutions to Public-Private Misalignments

Ben Purser, Pavneet Singh

viewpdf

Articles

The Phone-a-Friend Option: Use Cases for a U.S.-U.K.-French Crisis Communication Channel

Daniil Zhukov

viewpdf

Articles

China: Nuclear Crisis Communications and Risk Reduction

Dr. Tong Zhao

viewpdf

Articles

Use-Cases of Resilient Nuclear Crisis Communications: A View from Russia

Dmitry Stefanovich

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Actionable Safeguards: Containing and Recovering from Ransomware Attacks

Blueprint for Ransomware Defense Webinar Series | Daniel Cuthbert, Deborah Blyth, Adnan Baykal, Valecia Stocchetti

EVENT DESCRIPTION

After a ransomware attack occurs, what comes next? Our 4th webinar in the Blueprint for Ransomware Defense Webinar Series sought to help you get your business back up and running quickly in the aftermath of an attack.

On November 15, 2022, Daniel Cuthbert (Banco Santander), Deborah (Debbi) Blyth (Crowdstrike), Adnan Baykal (CyberWA), and Valecia Stocchetti (CIS) reviewed how to test and optimize incident reporting processes, who to contact should an incident occur, how to collect and store logs, and how to optimize data recovery.