Keep up with our work!

Follow us on Twitter for to keep up with the latest cybersecurity developments

Follow the Atlantic Council on LinkedIn for the the latest geopolitical analysis

Follow us on Spotify for the latest and greatest in cyber-themed music playlists


Cyber Statecraft team

Cyber Statecraft fellows

Keep up with our work!

Follow us on Twitter for to keep up with the latest developments



Aug 10, 2022

Dragon tails: Preserving international cybersecurity research

By Stewart Scott, Sara Ann Brackett, Yumi Gambrill, Emmeline Nettles, Trey Herr

A quantitative study on whether legal context can impact the supply of vulnerability research with detrimental effects for cybersecurity writ large through the coordinated vulnerability disclosure process (CVD), using recent regulations in China as a case study.

China Cybersecurity


Aug 5, 2022

Operational technology: Cloudy, with a chance of data 

By Emma Schroeder

In the second episode of The Cyber Moonshot, we again follow Neymar, Zafira, and Ernest in a quaint little food court on the surface of the moon. Follow along in their journey to understand the operational technology-cloud convergence and track down the path of the malware that has infected their port - before it becomes a permanent winter wonderland!

Cyber 9/12 Project

Aug 3, 2022

2022 Washington, DC Cyber 9/12 Strategy Challenge Playbook

Rockshot, Standingpalm, Software, Shoot! Scenario Summary Intelligence Report I Intelligence Report I Recommendations Intelligence Report II Intelligence Report II Recommendations Intelligence Report III Intelligence Report III Briefings Intelligence Report III Recommendations Scenario Summary In November 2022, while Quatar was hosting the , staff at the noticed a water-cooling issue within the plant. The staff managed […]


Issue Brief

Aug 2, 2022

Behind the rise of ransomware

By John Sakellariadis

Between 2016 and 2019, cybercriminals shifted from automated ransomware campaigns that emphasized scale to targeted extortion operations against organizations. This adaption made ransomware more disruptive and more profitable, culminating in the 2021 surge in ransomware. Though the US government has devoted more attention to ransomware since 2021, ransomware remains a significant and long-term threat to the US economy.


Issue Brief

Jul 25, 2022

Hackers, Hoodies, and Helmets: Technology and the changing face of Russian private military contractors

By Emma Schroeder, Gavin Wilde, Justin Sherman, and Trey Herr

Table of contents Introduction PMCs in Russian international security strategy and the influence of technology Training military forces abroadResource securityCombat missionsPolitical warfare Accessing offensive cyber and information technologies in the PMC community Where do PMCs go from here? About the authors Introduction The first time Russia invaded Ukraine in the twenty-first century, the Wagner Group […]

Africa Cybersecurity

The 5×5

Jun 29, 2022

The 5×5—Cybercrime and national security

By Simon Handler, Liv Rowley

Five experts weigh in on emerging trends in cybercrime and their impacts on national security. 

Cybersecurity Intelligence

Cyber 9/12 Project

Jun 27, 2022

Atlantic Council’s Cyber 9/12 Strategy Challenge expands to Scotland

The Abertay University cyberQuarter joins as a strategic partner for Cyber 9/12 Strategy Challenge, the world’s only multidisciplinary cyber competition. WASHINGTON DC – JUNE 27, 2022 – The Atlantic Council’s Cyber Statecraft Initiative, in partnership with the Scottish Government, Dewar Cyber Consulting, and Abertay University, will host the inaugural edition of the Cyber 9/12 Strategy […]

Issue Brief

Jun 14, 2022

Victory reimagined: Toward a more cohesive US cyber strategy

By Emma Schroeder, Stewart Scott, Trey Herr

US policy is on two potentially divergent paths: one that prioritizes the protection of American infrastructure through the pursuit of US cyber superiority, and one that seeks an open, secure cyber ecosystem.

Cybersecurity Security & Defense

The 5×5

May 12, 2022

The 5×5—Reflections on trusting trust: Securing software supply chains

By Simon Handler

Five experts discuss the implications of insecure software supply chains and realistic paths to securing them. 

Cybersecurity Defense Technologies


May 9, 2022

Cyber strategy: Assumptions and hypotheticals 

By Yumi Gambrill and Emma Schroeder

When academics, policymakers, and practitioners discuss security and conflict within the cyber domain, they are often hampered by a series of ongoing debates and unarticulated assumptions. We have brought together members of these communities to discuss the reasons that these debates are important to the shaping of cybersecurity and strategic plans.