HSPI Logo

Bookmark and ShareCyber Center for National and Economic Security

Government and business must work together to confront cybersecurity challenges to ensure our national and economic security. Approaches to do so must be consistent with our unique form of governance and the government’s twin responsibilities of providing for the common defense and maintaining an open marketplace. To this end, the Cyber Center for National and Economic Security (“CCNES”) seeks to serve as the definitive voice for cybersecurity thought leadership and endeavors to create an environment that balances the Internet’s openness with a robust national security posture.

World Executive MBA in Cybersecurity

This program is for leaders in the C-suite and in the trenches who want customized education that will provide a career advantage and the edge to meet and defeat cyber threats to global business in real-time. In just 16 months, participants will be equipped with the tools and experience to thrive where business, technology, and security intersect.

Read here to learn more about the World Executive MBA in Cybersecurity

 

Publications

NATO Meeting to Address Alliance Cybersecurity and Defense
Sharon Cardash
Security Debrief
July 01, 2013
More

It's the Ideology, Stupid
Frank J. Cilluffo and Sharon Cardash
The National Interest
June 03, 2013
More

Recalibrate U.S. Cyber Efforts to Better Meet the High-end Threat From Nation-states
by Frank J. Cilluffo
Huffington Post
More

A Blueprint for Cyber Deterrence: Building Stability Through Strength
by Frank J. Cilluffo, Sharon L. Cardash and George C. Salmoiraghi
Military and Strategic Affairs
More

Should Congress Investigate Chinese Tech Firms?

by Frank J. Cilluffo and Doug Guthrie
U.S. News and World Report
November 19, 2012
"The House Committee on Intelligence recently concluded that Chinese firms should be blocked from the U.s. telecom market due to their business practices and U.s. national security concerns. Proponents say the concerns are justified. opponents say they’re antiquated. " More

The U.S. Response to Cyber Threats
by Frank J. Cilluffo
AFPC's Defense Dossier
August 2012
"The cyber threat (and supporting technology) has markedly outpaced prevention and response efforts. In short, our ability to network is far greater than our ability to protect networks. Despite multiple incidents that could have served as galvanizing events to shore up U.S. resolve to formulate and implement the changes that are needed, we as a country have yet to take those necessary steps." More

While Congress Dithers, Cyber Threats Grow Greater

by Frank J. Cilluffo and Andrew Robinson
Nextgov
July 24, 2012
"Cybersecurity is an urgent priority -- national and economic security are at stake -- yet we do not yet have in place the legislation needed to deal with the threat. From network attacks to network exploitation the threat is real and emanates from a range of sources, including China, Russia, Iran and North Korea, transnational criminal organizations, and hackers for hire. Now is the time to act." More

Cyber Security Act of 2012 requires a liability protection bug fix
Gus Coldebella
The Hill
February 22, 2012
Former Acting General Counsel of DHS and HSPI Senior Fellow Gus Coldebella discusses the Senate cybersecuritybill sponsored by Senators Lieberman, Collins, Rockefeller and Feinstein. Coldebella discusses the legal substance of how the bill's libaility protections could be strengthened, removing dangerous disincentives to information sharing on the cybersecurity threat. More

Defense Cyber Strategy Avoids Tackling the Most Critical Issues
by Sharon L. Cardash and Frank J. Cilluffo
July 28, 2011
"Summer in Washington is not usually the time when major news breaks. This year is proving the exception as lawmakers and the White House struggle with the debt ceiling. Amid this economic activity, the Defense Department on July 14 issued its Strategy for Operating in Cyberspace. Given the volume and nature of nefarious cyber activity seen recently, a bold and innovative plan could have been expected. Those hoping for such would have been disappointed, however, at least by the unclassified version of the document made publicly available. With so much at stake, either in the cyber domain or dependent on it, a clear-eyed assessment of the strategy -- its strengths, weaknesses and gaps -- is in order. Indeed, the future shape of both conflict and warfare likely will include a cyber component." More

Managing Complexity in a WikiLeaks World
by Sharon L. Cardash and Frank J. Cilluffo
December 13, 2010
Before PFC Bradley Manning there was Philip Agee.  In 1975, disillusioned with and disaffected by his CIA career, Agee published Inside the Company which named scores of his onetime fellow officers, and generated shockwaves and significant consequences worldwide.  As a result of this systematic attempt to destabilize the US intelligence community and its operations, officials were recalled from their posts, operatives’ lives—both US and others—were placed at risk, protests against Agee’s actions were registered, and some (comparatively few, but notably the Soviet KGB and Cuban DGI) came to his defense.  The analogy with WikiLeaks is today imperfect in a wired world where information spreads instantaneously and to even the most obscure quarters.  Here, the complexity of coping with the horse that has left the barn is staggering. More

Cloud Computing Risks and National Security: Keeping Pace With Expanding Technology
by Frank Cilluffo, Ron Ritchey, and Timothy Tinker
September 9, 2010
While cloud computing offers limitless possibilities in terms of collaboration and access to data, the indefinable structure of this advanced technology raises several security concerns. The George Washington Policy University Homeland Security Policy Institute hosted a recent forum sponsored by Booz Allen Hamilton and Cisco Systems to address the myriad security concerns that arise as cloud computing deployments expand. More

Cyber Deterrence Symposium: Proceedings Report
Homeland Security Policy Institute
November 2009
This report captures the key points from a day-long symposium that brought together key stakeholders across government, both civilian and military, as well as thought leaders and private sector executives. Panel discussions addressed in sequence the cyber threat, deterrent capability, solutions, and implementation. Speakers emphasized that at the individual, corporate, and national level, we face constant peril from a range of sources, including state actors and cyber criminals, and from a range of threats, including espionage and potentially attacks against critical infrastructure. Throughout the day, speakers highlighted the stark and immediate need for an increased focus on cyber deterrence. More

NETworked Radicalization: A Counter-Strategy
Homeland Security Policy Institute and Critical Incident Analysis Group Task Force on Internet-Facilitated Radicalization
May 3, 2007
Savvy use of the Internet has empowered terror networks to expand their reach beyond national borders by enabling wide distribution of a compelling message and social connectivity with new audiences. Use of computer-mediated communication has made a range of terrorist operational activities cheaper, faster, and more secure, including communications, fundraising, planning and coordination, training, information gathering and data mining, propaganda and misinformation dissemination, and radicalization and recruitment. More

CyberStrategy 2.0
by Frank J. Cilluffo and J. Paul Nicholas
Journal of International Security Affairs
April 2006

Great minds have grappled with the manifestations of the information age for decades. Recently, however, it has been one of the information age’s most loved and feared catalysts—the Internet—that has taken center stage in national security planning. Even as the Internet went public in the early 1990s, strategic thinkers were already wrestling with its potential implications for communications, commerce, and even conflict. More

Cyber Threats and Information Security: Meeting the 21st Century Challenge
by Frank J. Cilluffo, Sharon L. Cardash, and Michele Ledgerwood
A Report of the CSIS Homeland Defense Project
May 21, 2001
More

Cyber-Attack: The National Protection Plan and Its Privacy Implications
by Frank J. Cilluffo
Journal of Homeland Security
November 2000

The information technology revolution has given us an unrivalled, perhaps unsurpassable, lead over the rest of the world in virtually every facet of modern life. Unfortunately there is a “dark side” to this revolution. Along with the clear rewards come new risks and a litany of unintended consequences that need to be better understood and managed by our industry and government leaders. More

Cyber Threats: Ten Issues to Consider
by Frank J. Cilluffo and Paul Byron Pattak
Georgetown Journal of International Affairs
Volume 1, Number 1, Winter/Spring 2000

While few adversaries would attempt to confront the United States in a conventional war on the traditional battlefield, its adversaries recognize that terrorism and other asymmetric forms of conflict, such as cyber attacks, are more effective methods of striking the United States where it is most vulnerable. More

 

Testimony & Presentations

Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure
Statement of Frank J. Cilluffo, HSPI Director
Before the U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
March 20, 2013
More | Video

The Future of Homeland Security: Evolving and Emerging Threats
Statement of Frank J. Cilluffo, HSPI Director
Before the U.S. Senate Committee on Homeland Security and Governmental Affairs
July 11, 2012
More| Video


The Iranian Cyber Threat to the United States
Statement of Frank J. Cilluffo, HSPI Director
Before the U.S. House of Representatives Committee on Homeland Security,
Subcommittee on Counterterrorism and Intelligence, and
Subcommittee
on Cybersecurity, Infrastructure Protection, and Security Technologies
April 26, 2012
More

The Internet: A Portal to Violent Islamist Extremism
Statement of Frank J. Cilluffo, HSPI Director
Before the U.S. Senate Committee on Homeland Security and Governmental Affairs
May 3, 2007
More

Critical Infrastructure Protection: Who’s in Charge
Statement of Frank J. Cilluffo, Co-chairman, Cyber Threats Task Force, Homeland Defense Project, Center for Strategic & International Studies
Before the U.S. Senate Committee on Government Reform
October 4, 2001
More

Wired World: Cyber Security and the U.S. Economy
Statement of Frank J. Cilluffo, Co-chairman, Cyber Threats Task Force, Homeland Defense Project, Center for Strategic & International Studies
Before the U.S. Congress Joint Economic Committee
June 21, 2001
More

Cyber Attack: The National Protection Plan and its Privacy Implications
Statement of Frank J. Cilluffo, Deputy Director, Organized Crime Project Director, Task Force on Information Warfare & Information Assurance, Center for Strategic & International Studies
Before the U.S. Senate Committee on the Judiciary, Subcommittee on Technology, Terrorism, and Government Information
February 1, 2000
More

 

Events

International Challenges and Opportunities: Law and Policy on Cybersecurity
Thursday, March 21, 2013
Event Overview, Speaker Biography and event video

White Paper Release: "Measuring the Impact of Policy on Global Cybersecurity"
Wednesday, February 6, 2013
Overview and PDF of Paper

A Conversation on Cyber Strategy with General James E. Cartwright

(CS)2 Series Event
Monday, May 14, 2012
Speaker biography, event overview and video

Effective Cybersecurity: Perspectives on a National Solution
The 13th Annual Robert P. Maxon Lecture
April 9, 2012
Event Overview and Speaker Biography

A Conversation on Cyber Security Legislation with Mike McConnell, Michael Chertoff, and Senior Congressional Staff
Policy and Research Forum Special Event
February 22, 2012
Event Video, Speaker Biographies, and Resources

Cloud Computing Risks and National Security
Policy and Research Forum
March 24, 2010
Event information

Cyber Deterrence Symposium
Policy and Research Forum Special Event
November 2, 2009
Event Summary, On Demand Video, and Resources

"Technology in Homeland Security: A Double-Edged Sword"
Policy & Research Forum
June 9, 2008
Event information

 

News

AT&T Joins Boeing Backing Cyber Bill Facing Privacy Fight
Bloomberg
April 08, 2013
More

Obama, CEOs Talk on Cybersecurity
CNBC
March 13, 2013
More

As Cyber Threats Mount, Business is Booming in the Security World
FOXBusiness
March 12, 2013
More

Did Iran's Cyber-Army Hack into the IAEA's Computers?
The Daily Beast
December 05, 2012
More

As Leadership Changes, Cybersecurity Remains Critical Issue for Congress

Government Security News
November 28, 2012
More

U.S. Warning Reflects Fears of Iranian Cyber Attack
Associated Press
October 12, 2012
More

Huawei Faces U.S. Lockout on Cyberspying Threat Citation
Bloomberg
October 9, 2012
More

Iranian Hackers Target Bank of America, JP Morgan, Citi
Reuters
September 21, 2012
More

Could Iran be Behind the Online Attacks on U.S. Banks?
CNBC
September 20, 2012
More

Civilian 'hacktivists' Fight Terrorists Online

LA Times
September 08, 2012
More

Huawei Expands Lobbying Amid National Security Probe by Congress

Washington Post
August 26, 2012
More

While Congress Dithers, Cyber Threats Grow Greater

Nextgov
July 24, 2012
More

Future Homeland Security Threats Comprise Smaller Groups, Cybersecurity Vulnerabilities, Experts Say
Homeland Security Today
July 12, 2012
More

Any Cybersecurity Bill Is Better Than No Bill, Senate Panel Told
National Journal
July 11, 2012
More

Malware Threat to Internet Corralled
Wall Street Journal
July 09, 2012
More

House Panel Probes Chinese Telecoms
Politico
June 18, 2012
More

Cybersecurity Poll: Americans Divided over Government Requirements on Companies

Washington Post
June 7, 2012
More

DHS Monitoring Social Media by "Flame": Will Iran Retaliate for the Latest Cyberassault?
CBS News
June 2, 2012
More

More Foreign Powers Focusing on Cyberwar
CNN
June 01, 2012

Attacked by "Flame": Will Iran Retaliate for the Latest Cyberassault?

Time
May 29, 2012
More

U.S. must strut cyber might to stop attacks, Cartwright says
Nextgov
May 15, 2012
More

What Evil Lurks in the Hearts of Hacktivists?
TechNewsWorld
April 30, 2012
More

U.S. Congress voices concern over Iran cyber-threat
Haaretz
April 28, 2012
More

Security Experts Warn of Cyber Threats From Iran
PCWorld
April 27, 2012
More

Iranian Cyberthreat to U.S. a Growing Concern
Dark Reading
April 26, 2012
More

Cybersecurity Experts: Don’t Aim for Perfection, Just Pass a Bill
CQ Homeland Security
April 26, 2012

House Panel: Iran Preparing for Cyberwar Against U.S., Allies
National Journal
April 26, 2012
More

Could Iran Wage A Cyberwar On The U.S.?
National Public Radio
April 26, 2012
More

Iran Readying Hacker Attacks on U.S. Infrastructure, Specialists Say
The Washington Times
April 25, 2012
More

Security Expert Frank Cilluffo Grades Our Defense
New Hampshire Public Radio
April 18, 2012
More

Militarisation of cyberspace: how the global power struggle moved online
The Guardian
April 16, 2012
More

US and China engage in cyber war games
The Guardian
April 16, 2012
More

‘Geeks’ become military’s new warriors
San Diego Union-Tribune
April 14, 2012
More

Northrop CEO Sees U.S. Role in Crafting Cybersecurity Standards
Bloomberg
April 10, 2012
More

Experts suspect cyberattacks have taken major Al Qaeda websites offline
NATOSource
April 3, 2012
More

Al-Qaida's Web forums offline for past 11 days
The Washington Post
April 3, 2012
More

Mystery surrounds silencing of key al Qaeda websites
CNN
April 3, 2012
More

NSA Chief Seeks Bigger Cybersecurity Role
Wall Street Journal
February 27, 2012
More

Experts Address Growing Cyber Threat to National Security
GW Today
February 23, 2012
More

Officials Urge Lawmakers Not to Weaken Cybersecurity Measures
CQ
February 22, 2012
More

FCC Chief Presses Internet Providers on Cybersecurity
Bloomberg
February 22, 2012
More

Cybersecurity--Stop Attacking Pearl Harbor
Security Debrief
September 15, 2011
More

Rise of the digital jihadists: Homeland Security says post 9/11 America has seen a new threat from the internet
The Daily Mail
September 8, 2011
More

Defense Cyber Strategy Avoids Tackling the Most Critical Issues
National Journal
July 28, 2011
More

Congress Demands Cyber Details While DOD Aims for Ambiguity
Stars & Stripes
July 21, 2011
More

Changing Power and Relationships
Government Executive
July 19, 2011
More

Working Towards Definitions
Government Executive
July 19, 2011
More

Modernizing Partnerships
Government Executive
July 19, 2011
More

Nation-States and Electronic Espionage
Reuters
June 20, 2011
HSPI Director Frank Cilluffo discusses the risks of state-sponsored electronic espionage with a panel of cyber-terrorism experts. More

Hackers Might Face Stiffer Sentences in U.S.
Reuters
June 18, 2011
Even before a loosely organized group of hackers broke into the CIA's and Senate's public websites, the White House asked for stiffer sentences for breaking into government and private computer networks. Last month the Obama administration pressed Congress to pass stronger cybersecurity measures, including a doubling of the maximum prison sentence for potentially endangering national security to 20 years in prison. More

 

Terrorists' Cyberattack Strategy

MyFoxNY
December 17, 2010

"Frank Ciluffo is one of the country's leading homeland security experts. He predicts cyberspace will be used by terrorists to maximize the impact of future attacks. 'I think al Qaeda is going to look at it as a means to enhance their lethality as a force multiplier,' Ciluffo said." More

Put Cybersecurity Chief in DHS not the White House, Senator Says
Computer World
November 3, 2009

"Delivering a speech on cybersecurity issues at George Washington University on Monday, Collins rejected the idea of a White House led cybersecurity effort and insisted the leadership would have to come from the U.S. Department of Homeland Security (DHS)." More

Senate's Cybersecurity Legislation Faces a Tangled Organizational Web
Congressional Quarterly
November 3, 2009

"Cybersecurity is so broad a subject that any legislation raises questions of economics and trade, technology and regulation, government structure and privacy, foreign policy and national security. 'The issue itself transcends and touches almost everything we as a government do,' said Frank Cilluffo, director of George Washington University’s Homeland Security Policy Institute." More

Conference Brings Deterrence Into the Cybersecurity Conversation
Congressional Quarterly
November 2, 2009

"For an event dealing with the digital world, there were a lot of concepts addressed at a Monday Homeland Security Policy Institute forum on “cyberdeterrence” that seemed rooted in Cold War-era discussions about nuclear weapons. Organizers at The George Washington University’s Homeland Security Policy Institute said they hosted the forum because cyberdeterrence — an idea within the broader topic of cybersecurity that suggests a more proactive approach than pure defense, including the use of statecraft — is often neglected. But for eight hours, everything, beginning with the very definition of cyberdeterrence itself, was on the table." More

Collins: DHS Is Where Cybercoordinator Belongs
Congressional Quarterly
November 2, 2009

"Collins has 'serious questions' about the effectiveness of any cybercoordinator in the White House, regardless of the position’s relationship with Congress, staff said. 'We don’t need yet another White House czar, a czar that would conflict with duties established elsewhere,' she said at a forum hosted by The George Washington University’s Homeland Security Policy Institute. Instead, she said she wants to see a cybersecurity center within the Department of Homeland Security with an 'empowered' director that could have a broad range of new authority." More

Sen. Collins Says No to WH Cybersecurity Coordinator
FederalNewsRadio
November 2, 2009

"Collins addressed the Homeland Security Policy Institute at George Washington University, where she announced that she and Lieberman, for the moment, are agreeing to disagree on the cybersecurity coordinator job: 'Now some have suggested that this effort can best be led from the White House. I've reached a different conclusion. Truly securing our nation's information technology infrastructure will require more than high-level strategy and coordination.'" More

Collins Details Plan for Cybersecurity Director
NextGov
November 2, 2009

"Senate Homeland Security and Governmental Affairs ranking member Susan Collins today called for creating a Senate-confirmed director of federal cybersecurity who would be based at the Homeland Security Department rather than the White House. 'Some have suggested that this effort can best be led from the White House. I've reached a different conclusion,' Collins said told an audience at an event hosted by the George Washington University's Homeland Security Policy Institute." More

Eye Opener: The Cybersecurity Debate Intensifies
The Washington Post
November 2, 2009

The Federal Eye Blog previews some of Senator Susan Collins remarks at HSPI's Cyber Deterrence Symposium. More

Cybersecurity Symposium to Kick off Week in Homeland Security
Congressional Quarterly
November 2, 2009

While most of the cybersecurity discussion in Washington focuses on protecting computer networks from foreign enemies and domestic hackers, a Homeland Security Policy Institute symposium on Monday will attempt to steer the conversation toward building an infrastructure that can deal with digital threats proactively.

“Security in itself is insufficient,” said Frank Cilluffo, director of the HSPI, a nonpartisan think tank at George Washington University. “We can’t build a moat. . . . The reality is that the capacity to attack our infrastructure is within the grasp of some of our potential attackers, so we need to examine our defenses while making sure that we’re not hamstringing our offensive capabilities.” More

Public Diplomacy in the Digital Age, Part 2
MediaShift (PBS)
March 5, 2009

In a report on how public diplomacy may be one avenue to prevent large scale online attacks, HSPI director Frank J. Cilluffo notes that without effectual public diplomacy gains, the specter of cyber-terrorism will grow more vivid as a new digitally savvy generation of would-be terrorists comes of age. More

Border, Internet cited in U.S. terror threat assessment
Associated Press
December 26, 2008

The terrorism threat to the United States over the next five years will be driven by instability in the Middle East and Africa, persistent challenges to border security, and increasing Internet savvy, according to a new federal intelligence assessment obtained by the Associated Press. More

 

Experts

Frank J. Cilluffo

Associate Vice President, The George Washington University
Director, Homeland Security Policy Institute
More

Michael Balboni

Principal, Navigators Global
Former New York State Deputy Secretary for Public Safety
Former New York State Senator
More

Gus Coldebella

Independent Consultant
Former General Counsel (Acting) and Former Deputy General Counsel, Department of Homeland Security
More

Michael Edwards

Corporate Director, AF C3 & Cyber Programs, Northrop Grumman
Former Director of Operations, Air Force Combat Support Office
Colonel, US Air Force (Ret)
More