Cybersecurity

Scholarly Publications

Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks

March 2019

Abstract: Technical tools dominate the cyber risk management market. Social cybersecurity tools are severely underutilised in helping organisations defend themselves against cyberattacks.

The Strategic Promise of Offensive Cyber Operations

September 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions?

Integrating offensive cyber capabilities: meaning, dilemmas, and assessment

August 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Other Publications

Andrew Grotto Testimony on "Cybersecurity and California Elections"

March 2018

To assess the threat to California's elections systems, the Assembly and Senate elections committees held a joint informational hearing on cybersecurity. The hearing discussed steps California...

News

Decades of Being Wrong About China Should Teach Us Something

June 2019

Thirty years ago this week, I watched the news from Beijing and started shredding my bedding.

The battle for American minds

March 2019

Congress’s annual worldwide-threat hearings are usually scary affairs, during which intelligence-agency leaders run down all the dangers confronting the United States.

America’s misbegotten cyber strategy

February 2019

I used to think we didn’t have enough strategic documents guiding U.S. cyber policy. Now I think we have at least one too many.

Events

Bytes, Bombs, and Spies The Strategic Dimensions of Offensive Cyber Operations

December 14, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

The Perfect Weapon: War, Sabotage and Fear in the Modern Age

October 22, 2018

Click here to RSVPAbstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has...

Cyber-Enabled Information Warfare and the End of the Enlightenment

December 18, 2017

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information...

Projects

Critical Infrastructure Resilience

The Critical Infrastructure Initiative builds the cyber-resilience of critical infrastructure through methodologically diverse outputs-oriented research and engagement with end users and homeland...
English

Multimedia

Drell Lecture: Secretary of Defense Ashton Carter

April 2015

The Honorable Ashton B. Carter, 25th U.S.

Cybersecurity Boot Camp

October 2014

Video of Cyber Boot Camp  The Stanford Congressional Cyber Boot Camp, sponsored by the Hoover Institution and the Center for International Security and Cooperation, was held on the Stanford campus from Aug. 18-20, 4014.

People

Headshot of Thomas Fingar Thomas Fingar Lecturer at APARC
Alex Stamos Adjunct Professor Visiting Scholar, Hoover Institution, Director, Stanford Internet Observatory
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Herb Lin Herbert Lin Senior Research Scholar
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Max Smeets Max Smeets Postdoctoral Fellow
Gregory Falco Postdoctoral Fellow
Alexa Corse CISAC Honors Student
Irving Lachow Irving Lachow Affiliate
Jesse Sowell Jesse Sowell Affiliate
Robert Silvers Robert Silvers Affiliate