CSIS Technology Policy Program

CSIS Technology Policy Program The CSIS Strategic Technologies Program looks at how technological change affects security and economic growth. Center for Strategic and International Studies (CSIS) provides strategic insights and policy solutions to decisionmakers in government, international institutions, the private sector, and civil society.
(1)

A bipartisan, nonprofit organization headquartered in Washington, DC, CSIS conducts research and analysis and develops policy initiatives that look into the future and anticipate change. Founded by David M. Abshire and Admiral Arleigh Burke at the height of the Cold War, CSIS was dedicated to finding ways for America to sustain its prominence and prosperity as a force for good in the world. Since 1962, CSIS has grown to become one of the world’s preeminent international policy institutions, with more than 220 full-time staff and a large network of affiliated scholars focused on defense and security, regional stability, and transnational challenges ranging from energy and climate to global development and economic integration. John J. Hamre has led CSIS as its president and chief executive officer since April 2000.

A bipartisan, nonprofit organization headquartered in Washington, DC, CSIS conducts research and analysis and develops policy initiatives that look into the future and anticipate change. Founded by David M. Abshire and Admiral Arleigh Burke at the height of the Cold War, CSIS was dedicated to finding ways for America to sustain its prominence and prosperity as a force for good in the world. Since 1962, CSIS has grown to become one of the world’s preeminent international policy institutions, with more than 220 full-time staff and a large network of affiliated scholars focused on defense and security, regional stability, and transnational challenges ranging from energy and climate to global development and economic integration. John J. Hamre has led CSIS as its president and chief executive officer since April 2000.

Operating as usual

09/15/2016
Deepening U.S.-Australia Cyber Security Cooperation | Center for Strategic and International Studies

We are hosting the Australian Prime Minister Malcom Turnbull for an event on how the United States and Australia can cooperate in cyberspace. PM Turnbull will discuss Australia's cyber security policy, cybersecurity developments in the Asia-Pacific, and common challenges and opportunities for U.S.-Australia partnership in securing our digital infrastructure. More information, including a link to RSVP, is available here: https://www.csis.org/events/deepening-us-australia-cyber-security-cooperation

This event will be webcast live from this page.

07/21/2016
Research Intern - Strategic Technologies - Washington, District of Columbia, United States - Center For Strategic And International Studies

We are now hiring for our fall internship! Apply here: https://csis-openhire.silkroad.com/epostings/index.cfm?fuseaction=app.jobInfo&version=1&jobid=91

The Center for Strategic and International Studies (CSIS) is a non-profit, bipartisan public policy organization established in 1962 to provide strategic insights and practical policy solutions to decision makers concerned with global security and...

07/08/2016
Cyber Bibliography | Center for Strategic and International Studies

The Strategic Technologies Program created a list of select publications on cybersecurity. This resource is in draft form. If you have any sugestions for added material, please email us at [email protected]:

https://www.csis.org/programs/strategic-technologies-program/cybersecurity/cyber-bibliography

The Strategic Technologies Program will maintain and regularly update this list of select publications on cybersecurity. This resource is in draft form. If you have any sugestions for added material, please email us at [email protected]. The program would like to thank William Crumpler for assembl...

New article by James Lewis on offensive cyber capabilities:"An early scene in the 1962 film Lawrence of Arabia shows Ger...
06/08/2016
The rationale for offensive cyber capabilities - The Strategist

New article by James Lewis on offensive cyber capabilities:

"An early scene in the 1962 film Lawrence of Arabia shows German planes swooping back and forth to bomb the rebel camp and Prince Feisal, who’s heroically mounted on a white charger, chasing the planes with his sword in hand. Horses against aeroplanes aptly describes the circumstance for any nation that wants to defend itself if it lacks military cyber capabilities. You can’t reasonably expect to have a modern, effective military if you can’t carry out cyber operations."

More here: http://www.aspistrategist.org.au/rationale-offensive-cyber-capabilities/

An early scene in the 1962 film Lawrence of Arabia shows German planes swooping back and forth to bomb the rebel camp and Prince Feisal, who’s heroically mounted on a white charger, chasing the planes ...

05/31/2016
www.aspi.org.au

New article by James Lewis on the rationale for offensive cyber capabilities:https://www.aspi.org.au/publications/cyberspace-and-armed-forces-the-rationale-for-offensive-cyber-capabilities/SI106_Cyberspace_armed-forces.pdf

05/20/2016
Cybersecurity After Information Sharing | Center for Strategic and International Studies

Join us on 5/24 to discuss cybersecurity after information sharing: https://www.csis.org/events/cybersecurity-after-information-sharing

Cybersecurity After Information Sharing Tuesday, May 24, 2016 8:30 am - 10:00 amCSIS Headquarters Increasing the sharing of cyber threat intelligence has been the main focus of the US Government’s strategy to enhance the cyber posture of the United States. With the passage of the 2015 Cybersecurity…

05/09/2016
Federal cybersecurity initiatives timeline - Draft 1

New Blog Post: Federal Cybersecurity Initiatives

http://www.csis-tech.org/blog/2016/5/9/federal-cybersecurity-initiatives-timeline-draft-1

A first cut at a list of Federal cybersecurity initiatives. I intentionally left out some of the purely ornamental functions (White House CTOs CIOs, NSTIC, etc.) or purely Departmental initiatives. There are some recurring themes (military operations, critical infrastructure protection), a lot of…

04/20/2016
Cybersecurity Data Visualization Competition | Center for Strategic and International Studies

Call for Proposals: CyberViz Competition
We are launching an open competition to develop new, interactive data visualizations for cybersecurity. Competition guidelines, rules, and additional information here: http://csis.org/program/cybersecurity-data-visualization-competition

The goal of the CyberViz Competition is to enable a deeper understanding of vulnerability, crime, and conflict in cyberspace through interactive visualizations that include multiple layers of data related to cybersecurity.

New at CSIS: ChinaPower, an interactive website that unpacks complex questions using expert analysis and data visualizat...
04/19/2016
How web-connected is China? | China Power Project

New at CSIS: ChinaPower, an interactive website that unpacks complex questions using expert analysis and data visualization. On the topic of China's web connectivity, Deputy Director and Senior Fellow Denise Zheng discusses the Great Firewall and Internet expansion. Check it out here - http://chinapower.csis.org/web-connectedness/#1460741007180-b377a0ec-0422

Power is often linked to military and economic strength, but technology is a critical component in the process of translating domestic resources into power.

03/30/2016

New Commentary: James A. Lewis on the US indictments and creating consequences that deter malicious cyber actors:

"The announcement of the indictment of seven Iranian hackers is part of a larger effort to reshape adversary thinking about the costs of attacking the United States. There has been a sequence of linked events - the PLA indictments, the response to Sony, the threat of sanctions before the Xi-Obama summit, and now these indictments. The effect is to push back against foreign-state hackers. These actions create consequences for malicious actions in cyberspace (recommended in a 2013 CSIS Report). When there is no consequence or penalty, there is no incentive to stop. Cyberspace has been largely penalty-free until recently. The indictments signal to our opponents to realize that attacking the United States can have consequences."

Full text here:http://csis.org/publication/indictments-countermeasures-and-deterrence

03/22/2016
t.co

Imperfect analogy, but if it took 5 years to crack high-end Soviet crypto, does it still take years, what's needed? https://t.co/NBVWgxuJRw

03/22/2016

Gosh, mass market encryption has exploitable flaws. Who would have thought that a kludge product on millions of devices was vulnerable. 废话

03/16/2016

General agreement that USG should not try its hand at online propaganda. See Peter Neumann at Kings College.

03/16/2016

Speaker at FT conference just warned about damage to companies from "inauthentic" statements on prvacy, security

https://t.co/XYf2XWkxUZ. Daphne Park was one of Britain's most remarkable spies.
03/14/2016
Baroness Park of Monmouth

https://t.co/XYf2XWkxUZ. Daphne Park was one of Britain's most remarkable spies.

Baroness Park of Monmouth, who died on March 24 aged 88, was one of Britain's most remarkable spies; her distinguished career in the Secret Intelligence Service (SIS) culminated in her appointment as Controller Western Hemisphere in 1975, the highest post ever occupied by a woman; she retired early…

03/04/2016

Carter did a good job at RSA. Very optimistic prediction on procurement reform to make DOD more attractive to Silicon Valley.

02/29/2016

Reaching for straws-If code is speech, why hasn't anyone ever given a speech in code? As dubious as the 13th amendment argument.

02/18/2016

Talked w friend from intel agency on how to beat perfect end-to-end encryption, settled on song from Cabaret-Money makes the World Go Round

02/17/2016
Posturing and Politics for Encryption

Posturing and Politics for Encryption https://t.co/YR9EeJFzJb

The encryption debate has been largely unencumbered by facts. That deserves a separate discussion, but for now, let us consider Apple’s stout refusal to cooperate with the FBI in gaining access to data stored on the phone of one of the San Bernardino murderers. Apple’s motives are clear, if not clea…

02/17/2016

If you want some fun, ask a European to explain the Patriot Act to you. The answer usual starts with: "when the moon is in the 7th house..."

02/05/2016

Whenever people tell me something is unhackable, I think about how the Titanic was unsinkable.

Address

1616 Rhode Island Ave NW
Washington D.C., DC
20036

General information

Current research at the CSIS Strategic Technologies Program includes strategic competition, innovation, cyber conflict, and internet governance. The program hosts regular discussions with leaders in government, industry, and the private sector.

Opening Hours

Monday 09:00 - 17:00
Tuesday 09:00 - 17:00
Wednesday 09:00 - 17:00
Thursday 09:00 - 17:00
Friday 09:00 - 17:00

Telephone

(202) 887-0200

Alerts

Be the first to know and let us send you an email when CSIS Technology Policy Program posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to CSIS Technology Policy Program:

Videos

Nearby government services


Other Washington D.C. government services

Show All