Cybersecurity

Recent Events

Records 24 / 72

Muddied Waters: Online Rumors, Conspiracy Theories, and Disinformation in the Context of Crisis Response

November 27, 2017

Abstract: Recent public attention and debate around “fake news” has highlighted the growing challenge of determining information veracity online.

Reforming national cyber defense

September 20, 2017

Abstract: The U.S. government continues to struggle with how best to defend the country from cyber attacks.

A strategic utility analysis of cyber weapons

September 18, 2017

Abstract: What is the strategic value of cyber weapons?

Countering information warfare: emerging challenges for national security

September 1, 2017

Abstract: The United States is (belatedly) waking up to the risk that adversaries will use social media and botnets to influence U.S. elections.

A Conversation with General Michael Hayden

April 27, 2017

About the Event: In conversation with Philip Taubman, General Hayden will discuss intelligence and cybersecurity challenges the United States faces in combatting terrorism, dealing with North Korea...

The continuation of policy by other means: asymmetric warfare via the ballot box

April 18, 2017

About the event: In his talk Toomas Hendrik Ilves will discuss how various digital tools have been used in democracies in Europe and the US in an attempt to disrupt and affect elections outcomes....

A Worst Practices Guide to Preventing Insider Threats

April 7, 2017

Video of Worst Practices Guide 5 16 17 Abstract: High-security organizations around the world face devastating threats from insiders—trusted employees with access to sensitive information,...

Private Foreign Policy

March 29, 2017

Abstract: Microsoft President Brad Smith recently analogized Microsoft to a “Digital Switzerland.” This moniker captures the role that U.S.

Reputation in the Anti-Abuse Regime

March 27, 2017

Abstract: Recently, Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud, and The New York Times were knocked out by a botnet driven by the Mirai malware.

The Challenges of Providing Data Security

January 18, 2017

  Video of Drell Lecture 2017, featuring Admiral Bob R.

Building resilient infrastructure? The most critical component is the people

December 13, 2016

Abstract: From programing firmware for IoT devices to misoperations in the field and control room, humans have the potential to offer creative, collaborative, and highly efficient solutions to some...

On the Identification and Analysis of Previously Unknown Linkages in Critical Infrastructure Systems

November 22, 2016

Abstract: Critical infrastructure systems including manufacturing facilities, ports, transportation systems, communications networks, and energy and water distribution systems often consist of many...

The Digital Dimension

November 21, 2016

Abstract: This presentation is adapted from two book chapters.  The first one published in 2007 is “Transforming U.S.

Cybersecurity Futures 2020

November 17, 2016

Abstract: What will be the state of digital security in five and 10 years? Will it be a "Wild West" where every person and organization must fight to protect their own personal data?

How to withstand a cyberattack: The future of resilience in the cyber and physical worlds

November 15, 2016

Abstract: We all know that we face cyberrisks everyday, from destructive attacks on our critical infrastructure to the theft of intellectual property.

Reality-based election security

November 2, 2016

Abstract:   There is a state of high anxiety about this year's election being "hacked" or "rigged".

Cyber Security Summit

September 16, 2016

While the Cyber Security Summit 2016 is not open to walk-ins, live-streaming will be available, starting on Monday, September 19 at 2:30PMhttp://livestream.com/stanford_webcast The debate on...

Implications of the Chinese military's uses of cyber for inter-state crisis management

August 1, 2016

Lunch will be served. Please RSVP to allow for an accurate headcount.Abstract: Dr.

Cybersecurity Regulations and Power Grid Resilience

May 24, 2016

Abstract: The NERC-CIP standards are the only federally mandated cybersecurity standards for critical infrastructure in the United States.  Targeting the electric system, the standards have been...

CISAC Honors Students Prize-Winning Presentations

May 18, 2016

- To ensure an accurate headcount for lunch, RSVPs are required -  

Cybersecurity Governance: Contested Norms, Organizational Challenges and Pressing Policy Issues in Software Vulnerability Disclosure

March 30, 2016

Abstract: The disclosure of software vulnerabilities has stirred controversy for decades among security researchers and software vendors, and more recently governments.

Deterrence and Arms Control in Cyberspace

March 22, 2016

Abstract: For four years running now, the Director of National Intelligence’s Worldwide Threat Assessment to Congress has led with cyber threats to national and international security.  Under...

Winning an Innovation War: Managing Risks from Emerging Technologies

March 14, 2016

Abstract: Faster evolving technologies, new peer adversaries, and the increased role of non-government entities changes how we think about decisions to develop and adopt new technology....

Ideology and Cybersecurity: Explaining the Origin and Structure of Civilian Cyber Defense

January 7, 2016

Abstract: Cybersecurity depends heavily on civilian cyber defense, which is decentralized, private, and voluntary.

People

Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Herb Lin Herbert Lin Senior Research Scholar for Cyber Policy and Security
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Jesse Sowell Jesse Sowell Postdoctoral Fellow
Max Smeets Max Smeets Postdoctoral Fellow
Rachel Hirshman Rachel Hirshman CISAC Honors Student
Thomas Fingar Fellow
Elaine Korzak Elaine Korzak Affiliate
Mim John Miriam "Mim" John Affiliate
Jamil Jaffer Jamil N. Jaffer Affiliate
Marc Goodman Marc Goodman Affiliate
Robert Silvers Robert Silvers Affiliate