Skip to:

Cybersecurity

Recent Events

Records 24 / 89

Wargaming War Games: How Likely is Thermonuclear Cyber War?

July 19, 2019

Abstract:  In the movie WarGames, a 1980s teenager hacks into a U.S.

The Cyber Security Threat: Lessons Learned from Devastating Attacks in Ukraine and the US

March 14, 2019

Recent years have witnessed an increasing number of cyber attacks originating in Russia that target the United States, European Union and EU member-states.

Bytes, Bombs, and Spies The Strategic Dimensions of Offensive Cyber Operations

December 14, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

The Perfect Weapon: War, Sabotage and Fear in the Modern Age

October 22, 2018

Click here to RSVPAbstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has...

The Consequences of Technological Developments for Politics and Government

April 17, 2018

The Consequences of Technological Developments for Politics and GovernmentTuesday, April 24, 2018Reception at 5:00pm.

Cyberspace, Information Strategy, and International Security - Marina Kaljurand and Elaine Korzak

February 22, 2018

Please join us for an informal discussion on with Marina Kaljurand and Elaine Korzak: Monday February 26th3:30-4:30pmEncina E207 (Reuben Hills Conference Room) This discussion will cover how...

Cyber-Enabled Information Warfare and the End of the Enlightenment

December 18, 2017

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information...

Muddied Waters: Online Rumors, Conspiracy Theories, and Disinformation in the Context of Crisis Response

November 27, 2017

Abstract: Recent public attention and debate around “fake news” has highlighted the growing challenge of determining information veracity online.

Cyber Initiative Seminar: How to Hack the Pentagon with Jay Kaplan, Synack

November 7, 2017

Through the Hack the Pentagon program, The Department of Defense (DoD) had asked Synack to look for vulnerabilities left undetected by traditional security solutions in one of their highly complex...

Introduction to Hacking: Exploiting Web, Binary, and Crypto Vulnerabilities

October 25, 2017

Are you interested in cybersecurity? Have you wanted to learn offensive cyber techniques  but don't know where to get started?

Securing California: Peter Liebert, CISO of the State of California

October 11, 2017

Stanford Cyber Initiative Seminar: Securing California - Peter Liebert, Chief Information Security Officer for the State of California. October 19th, 5pm, 380-380Y. What cybersecurity challenges...

Digital Technology and Democracy: Launch of the Global Digital Policy Incubator

September 26, 2017

Michael McFaul, Director of the Freeman Spogli Institute for International Studies, Professor Political Scienceand FSI Senior Fellow, Peter and Helen Bing Senior Fellow at the Hoover...

Reforming national cyber defense

September 20, 2017

Abstract: The U.S. government continues to struggle with how best to defend the country from cyber attacks.

A strategic utility analysis of cyber weapons

September 18, 2017

Abstract: What is the strategic value of cyber weapons?

Countering information warfare: emerging challenges for national security

September 1, 2017

Abstract: The United States is (belatedly) waking up to the risk that adversaries will use social media and botnets to influence U.S. elections.

A Conversation with General Michael Hayden

April 27, 2017

About the Event: In conversation with Philip Taubman, General Hayden will discuss intelligence and cybersecurity challenges the United States faces in combatting terrorism, dealing with North Korea...

The continuation of policy by other means: asymmetric warfare via the ballot box

April 18, 2017

About the event: In his talk Toomas Hendrik Ilves will discuss how various digital tools have been used in democracies in Europe and the US in an attempt to disrupt and affect elections outcomes....

A Worst Practices Guide to Preventing Insider Threats

April 7, 2017

Video of Worst Practices Guide 5 16 17 Abstract: High-security organizations around the world face devastating threats from insiders—trusted employees with access to sensitive information,...

Private Foreign Policy

March 29, 2017

Abstract: Microsoft President Brad Smith recently analogized Microsoft to a “Digital Switzerland.” This moniker captures the role that U.S.

Reputation in the Anti-Abuse Regime

March 27, 2017

Abstract: Recently, Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud, and The New York Times were knocked out by a botnet driven by the Mirai malware.

The Challenges of Providing Data Security

January 18, 2017

  Video of Drell Lecture 2017, featuring Admiral Bob R.

Building resilient infrastructure? The most critical component is the people

December 13, 2016

Abstract: From programing firmware for IoT devices to misoperations in the field and control room, humans have the potential to offer creative, collaborative, and highly efficient solutions to some...

On the Identification and Analysis of Previously Unknown Linkages in Critical Infrastructure Systems

November 22, 2016

Abstract: Critical infrastructure systems including manufacturing facilities, ports, transportation systems, communications networks, and energy and water distribution systems often consist of many...

People

Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Eileen Donahoe Lecturer, CDDRL
Herb Lin Herbert Lin Senior Research Scholar
Alex Stamos Adjunct Professor Visiting Scholar, Hoover Institution, Director, Stanford Internet Observatory
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Headshot of Thomas Fingar Thomas Fingar Lecturer at APARC
Dan Boneh Dan Boneh Co-director, Cyber Policy Center Professor, Electrical Engineering
Nathaniel Persily Co-director, Cyber Policy Center, Senior Fellow Professor, Law, Professor, by courtesy, Political Science, Professor, by courtesy, Communication
Jan Rydzak Research Scholar, CDDRL Research Scholar and Associate Director for Program, GDPi
Max Smeets Max Smeets Postdoctoral Fellow
Gregory Falco Postdoctoral Fellow