Cybersecurity

Recent Events

Records 24 / 76

Wargaming War Games: How Likely is Thermonuclear Cyber War?

July 19, 2019

Abstract:  In the movie WarGames, a 1980s teenager hacks into a U.S.

Bytes, Bombs, and Spies The Strategic Dimensions of Offensive Cyber Operations

December 14, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

The Perfect Weapon: War, Sabotage and Fear in the Modern Age

October 22, 2018

Click here to RSVPAbstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has...

Cyber-Enabled Information Warfare and the End of the Enlightenment

December 18, 2017

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information...

Muddied Waters: Online Rumors, Conspiracy Theories, and Disinformation in the Context of Crisis Response

November 27, 2017

Abstract: Recent public attention and debate around “fake news” has highlighted the growing challenge of determining information veracity online.

Reforming national cyber defense

September 20, 2017

Abstract: The U.S. government continues to struggle with how best to defend the country from cyber attacks.

A strategic utility analysis of cyber weapons

September 18, 2017

Abstract: What is the strategic value of cyber weapons?

Countering information warfare: emerging challenges for national security

September 1, 2017

Abstract: The United States is (belatedly) waking up to the risk that adversaries will use social media and botnets to influence U.S. elections.

A Conversation with General Michael Hayden

April 27, 2017

About the Event: In conversation with Philip Taubman, General Hayden will discuss intelligence and cybersecurity challenges the United States faces in combatting terrorism, dealing with North Korea...

The continuation of policy by other means: asymmetric warfare via the ballot box

April 18, 2017

About the event: In his talk Toomas Hendrik Ilves will discuss how various digital tools have been used in democracies in Europe and the US in an attempt to disrupt and affect elections outcomes....

A Worst Practices Guide to Preventing Insider Threats

April 7, 2017

Video of Worst Practices Guide 5 16 17 Abstract: High-security organizations around the world face devastating threats from insiders—trusted employees with access to sensitive information,...

Private Foreign Policy

March 29, 2017

Abstract: Microsoft President Brad Smith recently analogized Microsoft to a “Digital Switzerland.” This moniker captures the role that U.S.

Reputation in the Anti-Abuse Regime

March 27, 2017

Abstract: Recently, Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud, and The New York Times were knocked out by a botnet driven by the Mirai malware.

The Challenges of Providing Data Security

January 18, 2017

  Video of Drell Lecture 2017, featuring Admiral Bob R.

Building resilient infrastructure? The most critical component is the people

December 13, 2016

Abstract: From programing firmware for IoT devices to misoperations in the field and control room, humans have the potential to offer creative, collaborative, and highly efficient solutions to some...

On the Identification and Analysis of Previously Unknown Linkages in Critical Infrastructure Systems

November 22, 2016

Abstract: Critical infrastructure systems including manufacturing facilities, ports, transportation systems, communications networks, and energy and water distribution systems often consist of many...

The Digital Dimension

November 21, 2016

Abstract: This presentation is adapted from two book chapters.  The first one published in 2007 is “Transforming U.S.

Cybersecurity Futures 2020

November 17, 2016

Abstract: What will be the state of digital security in five and 10 years? Will it be a "Wild West" where every person and organization must fight to protect their own personal data?

How to withstand a cyberattack: The future of resilience in the cyber and physical worlds

November 15, 2016

Abstract: We all know that we face cyberrisks everyday, from destructive attacks on our critical infrastructure to the theft of intellectual property.

Reality-based election security

November 2, 2016

Abstract:   There is a state of high anxiety about this year's election being "hacked" or "rigged".

Cyber Security Summit

September 16, 2016

While the Cyber Security Summit 2016 is not open to walk-ins, live-streaming will be available, starting on Monday, September 19 at 2:30PMhttp://livestream.com/stanford_webcast The debate on...

Implications of the Chinese military's uses of cyber for inter-state crisis management

August 1, 2016

Lunch will be served. Please RSVP to allow for an accurate headcount.Abstract: Dr.

Cybersecurity Regulations and Power Grid Resilience

May 24, 2016

Abstract: The NERC-CIP standards are the only federally mandated cybersecurity standards for critical infrastructure in the United States.  Targeting the electric system, the standards have been...

CISAC Honors Students Prize-Winning Presentations

May 18, 2016

- To ensure an accurate headcount for lunch, RSVPs are required -  

People

Herb Lin Herbert Lin Senior Research Scholar
Toomas Ilves Toomas Hendrik Ilves Distinguished Visiting Fellow, Hoover Institution, GDPi Fellow, Stanford Cyber Initiative Fellow
Alex Stamos Adjunct Professor Visiting Scholar, Hoover Institution, Director, Stanford Internet Observatory
Headshot of Thomas Fingar Thomas Fingar Lecturer at APARC
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Gregory Falco Postdoctoral Fellow
John Villasenor John Villasenor Affiliate
Adam Segal Adam Segal Affiliate
Carey Nachenberg Carey Nachenberg Affiliate