Cybersecurity
Led by the Strategic Technologies Program and the International Security Program, CSIS’s cybersecurity portfolio covers cyber warfare, encryption, military cyber capacity, hacking, financial terrorism, and more.

Photo: Syda Productions/Adobe Stock
Evolving Cyber Operations and Capabilities
The war in Ukraine shows that cyber defense requires a different approach with new actors and strategies that will be complex for nations to construct. This report examines cybersecurity in Ukraine, with a look to the larger debate around cyber capabilities and defense.
Report by James Andrew Lewis and Georgia Wood — May 18, 2023

Global Trends in Cybersecurity Policy: The Case of Internet Security Liability
Commentary by Mari Kumano — May 2, 2023

Space Threat Assessment 2023
Report by Kari A. Bingen , Kaitlyn Johnson , Makena Young , and John Raymond — April 14, 2023

An Overview of Global Cloud Competition
Report by James Andrew Lewis — April 10, 2023
Past Events

Report Launch: Evolving Cyber Operations and Capabilities

Does the U.S. Need a Cyber Force?

A Conversation on Cybersecurity with NSA’s Rob Joyce

We Hold These Truths: How Verified Content Defends Democracies

Conference
Innovation for Resilience

The Biden-Harris Administration’s National Cybersecurity Strategy

Transatlantic Tech and Security: A Conversation with EU Commissioner Thierry Breton

Government Policies for Open Source Software
Experts

All content on Cybersecurity
Filter by
Creating a Consumer-Centric Digital Finance Ecosystem
Event by Romina Bandura , Michael Schlein , Christopher Burns , Sophie Sirtaine , and John Simon — June 27, 2023
The Biden Administration’s Cyber Plans for Critical Infrastructure: Focus on Pipelines, Rails, Aviation
Event by Anne Neuberger , Rob Silvers , David Pekoske , and James A. Lewis — June 1, 2023
Report Launch: Evolving Cyber Operations and Capabilities
Event by Paul Chichester , Erica Lonergan , Amy Ertan , Melanie Garson , Julia Voo , and James A. Lewis — May 18, 2023
Evolving Cyber Operations and Capabilities
Report by James Andrew Lewis and Georgia Wood — May 18, 2023
Global Trends in Cybersecurity Policy: The Case of Internet Security Liability
Commentary by Mari Kumano — May 2, 2023
Does the U.S. Need a Cyber Force?
Event by Mark Montgomery , John Davis , Emily Harding , and James Andrew Lewis — April 20, 2023
Space Threat Assessment 2023
Report by Kari A. Bingen , Kaitlyn Johnson , Makena Young , and John Raymond — April 14, 2023
A Conversation on Cybersecurity with NSA’s Rob Joyce
Event by Rob Joyce and James A. Lewis — April 11, 2023
An Overview of Global Cloud Competition
Report by James Andrew Lewis — April 10, 2023
The CLOUD Act and Transatlantic Trust
Report by Georgia Wood and James Andrew Lewis — March 29, 2023