Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Op-ed

The Nuclear Risk Reduction Approach: A Useful Path Forward for Crisis Mitigation

Sylvia Mishra

view

Reports

Nuclear Crisis Communications: Mapping Risk Reduction Implementation Pathways

Sylvia Mishra

viewpdf

Reports

Towards a Stronger Ukrainian Media Ecosystem

Leah Walker, Alexa Wehsener, Natalia Antonova

viewpdf

Op-ed

Pentagon’s Office of Strategic Capital must win over Silicon Valley

Leah Walker and Alexa Wehsener

view

Fact Sheet

DOD Establishes the Office of Strategic Capital

Strategic Balancing Initiative

viewpdf

Video

Cyber Resilience and Insurance Innovation

Blueprint for Ransomware Defense Webinar Series | Monica Shokrai, Davis Hake, Prashant Pai, and John Banghart

view

Reports

To the Point of Failure: Identifying Failure Points for Crisis Communications Systems

Leah Walker, Alexa Wehsener

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Actionable Safeguards: Containing and Recovering from Ransomware Attacks

Blueprint for Ransomware Defense Webinar Series | Daniel Cuthbert, Deborah Blyth, Adnan Baykal, Valecia Stocchetti

EVENT DESCRIPTION

After a ransomware attack occurs, what comes next? Our 4th webinar in the Blueprint for Ransomware Defense Webinar Series sought to help you get your business back up and running quickly in the aftermath of an attack.

On November 15, 2022, Daniel Cuthbert (Banco Santander), Deborah (Debbi) Blyth (Crowdstrike), Adnan Baykal (CyberWA), and Valecia Stocchetti (CIS) reviewed how to test and optimize incident reporting processes, who to contact should an incident occur, how to collect and store logs, and how to optimize data recovery.