Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Op-ed

The Nuclear Risk Reduction Approach: A Useful Path Forward for Crisis Mitigation

Sylvia Mishra

view

Reports

Nuclear Crisis Communications: Mapping Risk Reduction Implementation Pathways

Sylvia Mishra

viewpdf

Reports

Towards a Stronger Ukrainian Media Ecosystem

Leah Walker, Alexa Wehsener, Natalia Antonova

viewpdf

Op-ed

Pentagon’s Office of Strategic Capital must win over Silicon Valley

Leah Walker and Alexa Wehsener

view

Fact Sheet

DOD Establishes the Office of Strategic Capital

Strategic Balancing Initiative

viewpdf

Video

Cyber Resilience and Insurance Innovation

Blueprint for Ransomware Defense Webinar Series | Monica Shokrai, Davis Hake, Prashant Pai, and John Banghart

view

Reports

To the Point of Failure: Identifying Failure Points for Crisis Communications Systems

Leah Walker, Alexa Wehsener

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Foundational Safeguards: Tips and Tricks for Building Your Cybersecurity Foundation

Blueprint for Ransomware Defense Webinar Series | Phyllis Lee, Aaron McIntosh, Davis Hake, Ken Jenkins

EVENT DESCRIPTION

Foundational Safeguards are the building blocks that are necessary to establish an enterprise’s cyber security program. They also enable the implementation of Actionable Safeguards. To ease viewers into implementation of the Blueprint, this first session of a 5-part series will focus on the foundational Safeguards that are preventative measures to block a ransomware attack.

On October 25, 2022, Phyllis Lee (CIS), Aaron McIntosh (ActZero), Davis Hake (Resilience), and Ken Jenkins (SecurityScorecard) discussed the set of practices an enterprise must implement in order to effectively understand their environment, their users and their vulnerabilities and how to level up their protections.