Skip to:

Cybersecurity

Recent Other Publications

Records 7 / 7

How to build NERC CIP compliance: a new course by the SANS Institute

June 2016

This post is a review of a five-day NERC Critical Infrastructure Protection (CIP) training being offered by the SANS institute.

Risk in Cyber Systems

December 2015

Currently, significant uncertainty surrounds cyber security investments.

Maneuvering The China-U.S. Relationship in Cyberspace

October 2015

The article examines the impact of the summit between President Obama and President Xi on future cybersecurity relations between the two countries, and the changing nature of cyber cooperation and...

Analysis of Pin and TPM for Microsoft Laptops

September 2015

Organizations routinely face risk trade-offs.

House Energy & Commerce Committee Testimony on Cyber Threats

March 2015

On Tuesday March 3, 2015, the Subcommittee on Oversight and Investigations held a hearing entitled, “Understanding the Cyber Threat and Implications for the 21st Century Economy.” This was the...

NSA's Creative Interpretations of Law Subvert Congress and the Rule of Law

December 2013

CISAC Affiliate and Forbes Contributor Jennifer Granick explains how NSA domestic surveillance activities might continue, even in the face of legal decisions to rein in the agency's activities. ...

What We Need to Know About PRISM

June 2013

On June 6, the National Security Agency acknowledged the existence of a massive public surveillance program, called PRISM.

People

Herb Lin Herbert Lin Senior Research Scholar for Cyber Policy and Security
Jesse Sowell Jesse Sowell Postdoctoral Fellow
Max Smeets Max Smeets Fellow
Rachel Hirshman CISAC Honors Student
Timothy Junio Affiliate
Jane Holl Lute Consulting Scholar
Adam Segal Adam Segal Affiliate
Sean Kanuck Sean Kanuck Affiliate
Jason Healey Jason Healey Affiliate
Beth George Beth George Affiliate
David Elliott Affiliate
John Villasenor John Villasenor Affiliate