Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Op-ed

The Nuclear Risk Reduction Approach: A Useful Path Forward for Crisis Mitigation

Sylvia Mishra

view

Reports

Nuclear Crisis Communications: Mapping Risk Reduction Implementation Pathways

Sylvia Mishra

viewpdf

Reports

Towards a Stronger Ukrainian Media Ecosystem

Leah Walker, Alexa Wehsener, Natalia Antonova

viewpdf

Op-ed

Pentagon’s Office of Strategic Capital must win over Silicon Valley

Leah Walker and Alexa Wehsener

view

Fact Sheet

DOD Establishes the Office of Strategic Capital

Strategic Balancing Initiative

viewpdf

Video

Cyber Resilience and Insurance Innovation

Blueprint for Ransomware Defense Webinar Series | Monica Shokrai, Davis Hake, Prashant Pai, and John Banghart

view

Reports

To the Point of Failure: Identifying Failure Points for Crisis Communications Systems

Leah Walker, Alexa Wehsener

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Hacking in Plain Sight: Offensive Cyber Operations in the Russo-Ukrainian War

Erica D. Lonergan, Silas Cutler, Marc Rogers, and Megan Stifel

EVENT DESCRIPTION

When Russia invaded Ukraine, much was said about the perceived lack of cyber operations being used in the early part of the war. However, offensive cyber campaigns have indeed been key components of the ongoing conflict, and are important to investigate and understand.

On May 11, 2022, the Army Cyber Institute’s Erica D. Lonergan, Stairwell’s Silas Cutler, Okta’s Marc Rogers, and IST’s Megan Stifel had a conversation about the range of cyber operations seen in the Russo-Ukrainian war, how each country responded, the implications for both countries, and what we can learn when it comes to modern cyber operations in wartime.