Report - Addressing International IT Concentration Risk: A Five-Eyes Informed Exercise
The Center convened the latest in a series of tabletop exercises exploring IT concentration risk within a broader international context with Five Eyes officials and industry reps.
Recap - Offensive Cyber Operations: Charting a Legal and Strategic Path Forward
The discussion around offensive cyber operation may be quickly moving from theoretical to practical and CCPL’s “Offensive Cyber Operations: Charting a Legal and Strategic Path Forward,” looked at the challenges around this topic.
Examining Critical Infrastructure Cybersecurity and Resilience: A CCPL Tabletop Exercise After Action Report
The Center conducted a tabletop exercise exploring the ability of government and private sector to address disruption from a nation state with sophisticated cyber capabilities may cause to critical infrastructure if given extensive freedom of action.
Center’s New Amicus Brief in Epic v. Google: Competition Should Not Come at the Expense of Cybersecurity
In too many competition cases, cybersecurity has become an afterthought - the Center is seeking to halt this trend filing a series of amicus briefs seeking to educate the courts about core security consideration to correct lower-court overreach.
AI Governance in Latin America
Artificial intelligence is no longer a technology of the future, it is already transforming how societies function. But these tools need some level of oversight and this is explored in the latest white paper from the Digi Americas Alliance.
European Commission 2028-2034 Budget Proposal Includes Substantial Increase for Cyber, Digital Programmes
The European Commission presented its initial proposal for the European Union’s 2028-2034 financial framework that, if approved, could authorise nearly EUR 2 trillion in spending over seven years for cyber and other digital efforts.
State, Fed Cyber Leaders Discuss Resilience in Light of Evolving Threat, Budget Landscapes
State and federal cyber leaders convened in Austin to discuss the Texas Cyber Command, utilizing Zero Trust strategies in an era of AI, and improving Federal to State cyber cooperation in an era of constricting resources and increased threats.
How Existing Security Frameworks Can Help Meeting Bulk Data Rule Security Requirements
The DOJ bulk data rule prohibits certain transactions involving the sale or transfer of sensitive data. This post examines the security requirements and explains their interaction with existing cybersecurity and risk management frameworks and regs.
Recap: Threat Intelligence Forum
The U.S. Chamber of Commerce convened the Threat Intelligence Forum bringing together leaders from government and industry for in-depth discussions on the latest strategies and innovations shaping the market.