Cybersecurity

Scholarly Publications

Office of the Director of National Intelligence: From Pariah and Piñata to Managing Partner

June 2017

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z.

An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems

March 2017

Safety-critical system domains such as critical infrastructures, aerospace, automotive, and industrial manufacturing and control are becoming increasingly dependent on the use of distributed...

Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems

January 2017

Modern distributed systems and networks, like those found in cyber-physical system domains such as critical infrastructures, contain many complex interactions among their constituent software and...

Other Publications

Andrew Grotto Testimony on "Cybersecurity and California Elections"

March 2018

To assess the threat to California's elections systems, the Assembly and Senate elections committees held a joint informational hearing on cybersecurity. The hearing discussed steps California...

How to build NERC CIP compliance: a new course by the SANS Institute

June 2016

This post is a review of a five-day NERC Critical Infrastructure Protection (CIP) training being offered by the SANS institute.

Risk in Cyber Systems

December 2015

Currently, significant uncertainty surrounds cyber security investments.

News

Cyberspectives: national cybersecurity priorities with Andrew Grotto

June 2018

 Introducing Cyberspectives, a new podcast analyzing the cyber issues of today with host John Villasenor.In the inaugural episode, guest Andrew Grotto provides analysis on a broad range of cyber...

General James M. Holmes meets Stanford students

June 2018

On May 23, Stanford students enrolled in Technology and Security (MS&E 193/293) met with General James M. Holmes.

Events

Cyber-Enabled Information Warfare and the End of the Enlightenment

December 18, 2017

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information...

Muddied Waters: Online Rumors, Conspiracy Theories, and Disinformation in the Context of Crisis Response

November 27, 2017

Abstract: Recent public attention and debate around “fake news” has highlighted the growing challenge of determining information veracity online.

Reforming national cyber defense

September 20, 2017

Abstract: The U.S. government continues to struggle with how best to defend the country from cyber attacks.

Projects

Critical Infrastructure Resilience

The Critical Infrastructure Initiative builds the cyber-resilience of critical infrastructure through methodologically diverse outputs-oriented research and engagement with end users and homeland...
English

Science Seminar Series

The CISAC Science Seminar Series features speakers who present scientific subjects with international security and policy implications.
English

Multimedia

Drell Lecture: Secretary of Defense Ashton Carter

April 2015

The Honorable Ashton B. Carter, 25th U.S.

Cybersecurity Boot Camp

October 2014

Video of Cyber Boot Camp  The Stanford Congressional Cyber Boot Camp, sponsored by the Hoover Institution and the Center for International Security and Cooperation, was held on the Stanford campus from Aug. 18-20, 4014.

People

Thomas Fingar Fellow
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Herb Lin Herbert Lin Senior Research Scholar
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Jesse Sowell Jesse Sowell Postdoctoral Fellow
Max Smeets Max Smeets Postdoctoral Fellow
Rachel Hirshman Rachel Hirshman CISAC Honors Student
Rebecca Slayton Rebecca Slayton Affiliate
Thomas Berson Affiliate
Enrique Oti Enrique Oti Affiliate
Irving Lachow Irving Lachow Affiliate
Mark Weatherford Mark Weatherford Affiliate