To achieve greater stability and civility in cyberspace, the Carnegie Cyber Policy Initiative develops strategies and policies in several key areas and promotes international cooperation and norms by engaging key decisionmakers in governments and industry.
Working with Princeton University, we have convened an Encryption Working Group to advance a more constructive dialogue on encryption policy. The working group consists of former government officials, business representatives, privacy and civil rights advocates, law enforcement experts, and computer scientists. Learn more about its members and papers released so far.
Our work on U.S.-China cyber stability issues aims to bridge divides between these two key actors in cyberspace. We enlist U.S. and Chinese experts and officials in dialogue on managing cyber risks to nuclear stability and aims to enhance understanding of Chinese thinking on stabilizing cyberspace among U.S. officials and experts.
To protect the financial system against cyber threats, our project provides actionable policy proposals and in-depth strategic analysis for governments and industry alike with practical guidance to enhance resilience of the financial system around the globe.
In support of the international cybersecurity norms process, our Cyber Norms Index tracks relevant multilateral and bilateral accords at the UN, the G20, the OSCE and other international organizations and fora. In addition, our scholars regularly publish in-depth analyses of latest developments and trends and develop specific proposals for consideration by decision-makers in government and industry alike.
Our market incentives project focuses on identifying new levers in the private sector and commercial space to incentivize behavior that reduces cyber risk, recognizing that government cannot ameliorate the risk landscape alone.
We engage current and former officials in the most advanced cyber states to discuss the potential benefits of agreeing to constrain purposeful manipulations of the ICT supply chain. We also engage with large technology supplying and procuring companies to motivate them to make parallel commitments to enhance supply chain integrity.
Everyone who worries about cyber threats—including governments, pundits, scholars, business leaders—longs for a “strategy” that will deter or defeat the bad guys. Some seek analogues to the cohering strategies that enabled the West to win the Cold War at tolerable costs. Yet, cyberspace—and the nature, ownership, and effects of cyber tools—may not lend themselves to the strategies that managed military and geopolitical competition in the Cold War.
The Cyber Policy Initiative engages in ground-breaking analysis and policy development focusing on key challenges in cyber strategy and stability. We engage high-level decisionmakers and experts, and our scholars regularly comment on the latest cybersecurity policy developments. Sign up to receive updates about our latest research, to read our monthly news round-up, Global Cyber News, and to be invited to our upcoming events.
Follow us on Twitter.