Skip to:

Cybersecurity

Scholarly Publications

Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks

March 2019

Abstract: Technical tools dominate the cyber risk management market. Social cybersecurity tools are severely underutilised in helping organisations defend themselves against cyberattacks.

The Strategic Promise of Offensive Cyber Operations

September 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions?

Integrating offensive cyber capabilities: meaning, dilemmas, and assessment

August 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Other Publications

Andrew Grotto Testimony on "Cybersecurity and California Elections"

March 2018

To assess the threat to California's elections systems, the Assembly and Senate elections committees held a joint informational hearing on cybersecurity. The hearing discussed steps California...

News

Understanding 'Putin's Playbook'

April 2019

To thwart the effects of ‘Putinism,’ the American people must first understand the nature of the threat, Michael McFaul told the House Intelligence Committee.What is “Putinism,” and what threat...

Michael McFaul Testifies Before House Intelligence Committee

March 2019

The House Permanent Select Committee on Intelligence held a public hearing on Thursday, March 28, 2019, as part of its investigation into Russian influence during and after the 2016 election...

MIP Feature Friday: Lisa Einstein

March 2019

"There is this sense of possibility - this sense of 'if this is your idea, just do it."Our graduate student, Lisa Einstein, approaches her work and studies by this motto.

Events

The Cyber Security Threat: Lessons Learned from Devastating Attacks in Ukraine and the US

March 14, 2019

Recent years have witnessed an increasing number of cyber attacks originating in Russia that target the United States, European Union and EU member-states.

Bytes, Bombs, and Spies The Strategic Dimensions of Offensive Cyber Operations

December 14, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

The Perfect Weapon: War, Sabotage and Fear in the Modern Age

October 22, 2018

Click here to RSVPAbstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has...

Projects

Critical Infrastructure Resilience

The Critical Infrastructure Initiative builds the cyber-resilience of critical infrastructure through methodologically diverse outputs-oriented research and engagement with end users and homeland...
English

Multimedia

Cybersecurity

May 2018

Data breaches. Malware. Theft of corporate secrets. Hacking of elections. As the world’s information has moved more and more online, so have the world’s crime, terrorists, and clandestine operations.

Cybersecurity Strategies

May 2018

In a world of increasingly sophisticated hackers, continual phishing attacks, and bots created to sabotage civil public discourse, what can individuals, organizations, and nations do to protect themselves? In this video, Dr.

How will Michael Flynn's resignation affect US-Russia relations?

February 2017

Russia expert and Stanford University senior fellow Kathryn Stoner on Russian reaction to the national security adviser's resignation. Watch the video here.

People

Headshot of Thomas Fingar Thomas Fingar Lecturer at APARC
Eileen Donahoe Lecturer, CDDRL
Alex Stamos Adjunct Professor William J. Perry Fellow
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Herb Lin Herbert Lin Senior Research Scholar
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Nathaniel Persily Professor, Stanford Law School
Dan Boneh Dan Boneh Co-director of the Stanford Cyber Initiative
Jan Rydzak Research Scholar, CDDRL Research Scholar and Associate Director for Program, GDPi
Gregory Falco Postdoctoral Fellow
Max Smeets Max Smeets Postdoctoral Fellow