top of page
About
Principals
Leaders' Corner
Summits
Virtual Summit Series
Winter Summit 2024
Fall Summit 2024
Summer Summit 2024
Spring Summit 2024
Winter Summit 2023
Fall Summit 2023
Spring Summit 2023
Winter Summit 2022
Summer Summit 2022
Spring Summit 2022
First Quarter Summit 2022
2021 Cybersecurity Summit
Book Reviews
Digital Magazine
More
Use tab to navigate through the menu items.
Leaders' Corner
U.S. National Security Depends on American Tech and a Healthy Relationship with Risk
John Edwards
Feb 28, 2024
Hackers are Taking Advantage of Gaps in U.S. Cybersecurity Policy
Mark Montgomery and Michael Sugden
Feb 15, 2024
Information Quality is a Democratic Necessity in the Age of AI
Ellen McCarthy and Doowan Lee
Feb 12, 2024
Elections are Primed for ‘Wave of Misinformation’
Patrick Weninger
Feb 8, 2024
From the Battlefield to Your Backyard: The Looming Drone Threat in America
Dave Spirk and Jon Gruen
Feb 5, 2024
Loose lips can still sink ships: Protect your Critical Information
Michael Casey
Jan 24, 2024
A New Year Means Further Transformative Shifts in Cyber
Kelly Bissell
Jan 17, 2024
Taiwan’s Election Offers Strong Lessons on Disinformation
Walter Pincus
Jan 16, 2024
DARPA’s Focus on ‘Manipulated Media’ Lays Out Technology for Combatting Disinformation and more
Walter Pincus
Jan 2, 2024
The Administration’s Confusion on AI is Bad for U.S. Security
Klon Kitchen
Jan 2, 2024
The Intelligence Community ‘Can’ Tackle Open-Source Data in a Hyper-Connected World
Chip Usher and Kristin Wood
Dec 21, 2023
To Beat China and Russia in Cyberspace, Change the Game
Adam Maruyama
Dec 14, 2023
Foreign Criminals are Scamming Americans out of Billions of Dollars. Is it a National Security Threat?
Ken Westbrook
Dec 8, 2023
Targeting FBI Budget Makes Us More Vulnerable on Cyber
Mark Montgomery and Jiwon Ma
Dec 1, 2023
Defense Department Report Highlights Cyber Threat from China
Mark Montgomery and Jiwon Ma
Nov 6, 2023
Chinese and Russian Space Pursuits Are Picking Allied Pockets
Andrew Borene
Oct 19, 2023
Warning Signs for How Generative AI Will Impact the Next Election
Dr. Sean Guillory
Oct 18, 2023
Innovative Business Models Can Accelerate Tech for IC Missions
Chris Menza and Laura Yoeckel-Kelly
Oct 3, 2023
Financial Sector Cybersecurity is National Security
Tom Pfeifer
Sep 22, 2023
Our Biggest Cyber Vulnerability
Jon Darby
Mar 23, 2023
Q&A with Suzanne Spaulding
Suzanne Spaulding
Mar 21, 2023
Our Greatest Cyber Challenge is that of Execution
Steve Hill
Mar 20, 2023
Watching But Not Waiting: Vigilance, Diligence, and Resilience on Cybersecurity
Debora A. Plunkett
Mar 10, 2023
Q&A with The Honorable Susan Gordon
The Cipher Brief Team
Mar 8, 2023
We Have a New National Cybersecurity Strategy. Now What?
Mark Montgomery and Samantha F. Ravich
Mar 3, 2023
Q&A with Matt Hayden
The Cipher Brief Team
Jan 26, 2023
Q&A with Paolo Dal Cin
The Cipher Brief Team
Jan 24, 2023
Q&A with Frank Cilluffo
The Cipher Brief Team
Jan 17, 2023
Q&A with Rick Ledgett
The Cipher Brief Team
Jan 12, 2023
The Pentagon's Cyber Personnel Issue Need More Attention
Walter Pincus
Jan 10, 2023
Data-Driven Cybersecurity is a Superweapon
Greg McCullough
Nov 28, 2022
Six Steps Every Organization Can Take to Reduce Cyber Risk in their Supply Chain
Jim Rosenthal
Nov 27, 2022
What We Need are More Cyber Warrior Scholars
Andrew Borene, Julie Ferringer, and Chris Ventura
Oct 21, 2022
Iranian-backed attacks on Albania highlights need for Cyber Capacity Building
Mark Montgomery
Sep 19, 2022
Money and Partnerships Matter in Cybersecurity
Mark Montgomery and Jiwon Ma
Aug 4, 2022
Equipping U.S. Partners in Cyberspace is a Must
Mark Montgomery
Jul 11, 2022
Providing Protection from the Perfect Cyber Storm
Paolo Dal Cin
Jul 6, 2022
The Complex Reality of Cyber War and Ukraine
Robert Hannigan
Jul 6, 2022
The National Security Implications of New Rules of the Road for Cyber
The Cipher Brief
May 11, 2022
In Cyber: Resilience is about Capabilities, not Plans
Phil Venables
Mar 28, 2022
5G Security: Seeing Through the Clouds
Chris Christou and Joseph Bull
Mar 22, 2022
‘Watch’ or ‘Stand Against’ the Digital Machinery of Aggression in Ukraine
Christopher Ahlberg and Geoff Brown
Feb 26, 2022
The Ukraine Cyber Crisis: We Should Prepare but not Panic
Sandra Joyce
Feb 22, 2022
Want to Dominate in Cyber? Better Change your Policy.
Cynthia Saddy, Daniel Hoffman, General Joe Anderson (Ret.)
Jan 23, 2022
A New Path to Cyber Conflict with Russia
Walter Pincus
Jan 22, 2022
5G Security: It’s Zero Hour for Zero Trust
Dr. Kristopher Hall and Matthew Edwards
Dec 14, 2021
The Supply Chain is the Perfect Asymmetric Target
Robert Hannigan
Dec 12, 2021
Artificial Intelligence in the IC: Culture is Critical
Corin Stone
Aug 22, 2021
Arms Control for Cyber
Joseph DeTrani
Aug 8, 2021
Leveraging Uncertainty for Strategic Cyber Deterrence
Gentry Lane
Aug 5, 2021
bottom of page