Cybersecurity
Led by the Strategic Technologies Program and the International Security Program, CSIS’s cybersecurity portfolio covers cyber warfare, encryption, military cyber capacity, hacking, financial terrorism, and more.

Photo: Syda Productions/Adobe Stock
Evolving Cyber Operations and Capabilities
The war in Ukraine shows that cyber defense requires a different approach with new actors and strategies that will be complex for nations to construct. This report examines cybersecurity in Ukraine, with a look to the larger debate around cyber capabilities and defense.
Report by James Andrew Lewis and Georgia Wood — May 18, 2023

Global Trends in Cybersecurity Policy: The Case of Internet Security Liability
Commentary by Mari Kumano — May 2, 2023

Space Threat Assessment 2023
Report by Kari A. Bingen , Kaitlyn Johnson , Makena Young , and John Raymond — April 14, 2023

An Overview of Global Cloud Competition
Report by James Andrew Lewis — April 10, 2023
Past Events

Report Launch: Evolving Cyber Operations and Capabilities

Does the U.S. Need a Cyber Force?

A Conversation on Cybersecurity with NSA’s Rob Joyce

We Hold These Truths: How Verified Content Defends Democracies

Conference
Innovation for Resilience

The Biden-Harris Administration’s National Cybersecurity Strategy

Transatlantic Tech and Security: A Conversation with EU Commissioner Thierry Breton

Government Policies for Open Source Software
Experts

All content on Cybersecurity
Filter by
We Hold These Truths: How Verified Content Defends Democracies
Event by Emily Harding , Suzanne Spaulding , Ambassador Beth Van Schaack , Dana Rao , Jessica Brandt , Dr. Matthew Turek , Andrew Jenks , Andy Parsons , and Mounir Ibrahim — March 27, 2023
Innovation for Resilience
Event by Caitlin Durkovich , and Stephanie LaRue , Benjamin DeAngelo , Robert Costello , John Costello , Alice Hill , Suzanne Spaulding , Emily Harding , Hadeil Ali , Joseph Majkut , James Andrew Lewis , Bob Kolasky — March 23, 2023
Innovation for Resilience
Report by Suzanne Spaulding , Emily Harding , Hadeil Ali , Joseph Majkut , Harshana Ghoorhoo , Morgan Higman , Devi Nair , Naz Subah , and Sophia Barkoff — March 23, 2023
TikTok: To Ban or Not to Ban?
Podcast Episode by Caitlin Chin — March 15, 2023

There Are Tradeoffs in Governing the Metaverse
Critical Questions by Zhanna L. Malekos Smith — March 13, 2023
The Future of the Semiconductor Ecosystem
Podcast Episode by James Andrew Lewis — March 10, 2023

TikTok: Is it Chinese Espionage?
Podcast Episode by H. Andrew Schwartz and James Andrew Lewis — March 9, 2023

Implementing Cyber Confidence-Building Measures
Podcast Episode by James Andrew Lewis and Christopher Painter — March 7, 2023

From Maybe-Secure to Responsible Security: The New National Cybersecurity Strategy
Commentary by Emily Harding — March 6, 2023
For Stronger Tech, Europe Must Spend More on Defense and Research
Commentary by Charles Wessner — March 3, 2023