The Wilson Center is hosting an exclusive look at The Perfect Weapon, the striking and sobering new book by acclaimed New York Times National Security Correspondent David Sanger, who researched and wrote while in residence at the Wilson Center. The Perfect Weapon is the gripping inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes -- from crippling infrastructure to sowing discord and doubt -- cyber is now the weapon of choice for democracies, dictators, and terrorists.
- ARMED CONFLICT
- ASIA & PACIFIC
- BOOK LAUNCH
- ENVIRONMENTAL CONFLICT
- HOUSE OF REPRESENTATIVES
- HUMAN RIGHTS
- MIDDLE EAST
- MULTILATERAL AFFAIRS
- REPORTS & PAPERS
- THE AMERICAS
- U.S. FOREIGN POLICY
- U.S. Military
- U.S. POLITICS
- U.S. SENATE
- URBAN WARFARE
- WOMEN & GIRLS
MARK YOUR CALENDAR
Please check with organizer for the most up-to-date information.
All events subject to change without notice.
The Journal of National Security Law & Policy is hosting their annual symposium, this year titled "The New Cold War?: The State of U.S.-Russia Relations & Unconventional Threats to U.S. Security." Throughout the day, there will be three panels and a lunchtime keynote speech by Laura Kennedy, former Deputy Assistant Secretary for European and Eurasian Affairs under the George W. Bush Administration.
The International and Comparative Law Program, the ABA Section on International Law, and the American Society of International Law are presenting the 8th Annual "Live from L" with the Office of the Legal Adviser.
Winning the Frontier: U.S.-Japan Cooperation on Global Standards for Emerging Technologies, from AI to 5G
Featuring an expert panel, this event hosted by CSIS seeks to explore some of the key technologies where the debate is already underway, the actors involved in this space, and the competition to shape the emerging technological landscape.
Please join the Wilson Center and the Aspen Institute Homeland Security Group as Secretary of Homeland Security Kirstjen M. Nielsen discusses her Department's strategy for confronting the terror landscape facing the United States—including aviation security, radicalization, enhanced screening and vetting measures and protecting against soft target attacks.
The Foreign Policy program at Brookings is hosting a discussion on the future of warfare and multi-domain battlespaces. General James M. Holmes of the U.S. Air Force, and commander of Air Combat Command, with give opening remarks. Brookings Senior Fellow Michael O’Hanlon will then join General Holmes for a discussion, adding his own perspective.
In a new book, Cyber Mercenaries: The State, Hackers, and Power, Tim Maurer examines these state-hacker relationships and the important questions they raise about the control, authority, and use of offensive cyber capabilities. Drawing on case studies in the United States, Iran, Syria, Russia, and China, the book establishes a framework to better understand and manage the impact and risks of cyber proxies on global politics. Maurer will be joined in conversation at the Carnegie Institute for International Peace by Eric Rosenbach, and Ellen Nakashima will moderate.
In Understanding Cyber Conflict, published by Georgetown University Press, leading scholars and former officials explore how fourteen analogies to earlier weapons, wars, and defense strategies could inform or misinform our understanding of cyber conflict.
The Carnegie Endowment for International Peace is hosting the author Michael Morell who will deliver introductory remarks, following which co-editor George Perkovich will moderate a discussion with chapter authors David Sanger, Emily O. Goldman, and Ariel (Eli) Levite.
Social media has reshaped the way societies engage in politics and war across the Muslim world. From ISIS’ use of social media to recruit to its role in the Arab Spring the Internet has become a site of conflict. In his new book, Haroon Ullah examines the unprecedented impact of social media across the region addressing both its democratic revolutionary impact as well as how it has been co-opted by religious conservatives and extremists.
The Heritage Foundation is hosting an event to discuss lone wolves, recruitment and radicalization, asking: How is ISIS using social media and digital outreach to infect our society and push would be extremists to the edge?
The Atlantic Council and the Pew Research Center are hosting a conversation with a panel of experts to discuss Pew’s latest survey analyzing global perspectives and the greatest risks and threats facing the world today.
CSIS and the United States Naval Institute (USNI) are co-hosting a Maritime Security Dialogue event featuring Vice Admiral Jan Tighe, Deputy Chief of Naval Operations for Information Warfare/Director of Naval Intelligence, for a discussion on cyber warfare in the maritime domain.
Non-Traditional Security in Asia: Disaster Response and Cybersecurity in a Time of Rising Challenges and Constrained Resources
How will states meet the challenges posed by disaster relief and cybersecurity? What opportunities exist for non-state actors, such as NGO’s and the private sector to play a role? To answer these questions and more, the Asia Programs of FPRI and the Wilson Center have assembled a leading group of experts.
A Conversation with HASC Ranking Member Adam Smith (D-WA): Russia, the Military, and Emerging Threats
The Center for a New American Security (CNAS) is hosting an on the record conversation on Russia, the modern threat environment, and how the U.S. military should prepare.
AEI is hosting the launch of Jeremy Rabkin and John Yoo’s new book, “Striking Power: How Cyber, Robots, and Space Weapons Change the Rules for War” (Encounter Books, 2017), to discuss how new military technologies will shape the future of warfare.
This training hosted by the IHL team at the American Red Cross will provide participants with an understanding of how international humanitarian law applies to cyber operations. The training will explore what is meant by the terms ‘cyber space’, ‘cyber warfare’ and ‘cyber attack’, and consider how jus in bello principles of distinction and neutrality might translate to cyber operations.
Russian foreign policy objectives are poorly understood today. This is because most analysts look at Russia through Western eyes. But, Russia is not only Moscow. Russia is Siberia and the Far East also. This lecture hosted by the Institute of World Politics will provide a three-dimensional view of Russia, it will contextualize Russian actions over the past decade beyond the headlines, and it will illustrate why U.S. foreign policy toward Russia is misguided (and how to correct the strategic misperceptions).
The Atlantic Council is hosting a discussion bringing together leading experts from the industry, government, and academia to discuss the chilling consequences the emergence of cyberspace as a new field of conflict has had on the global order. The event also celebrates the launch of Alexander Klimburg’s new book The Darkening Web: The War for Cyberspace.
Global Leaders Forum: The Rt Hon Sir Michael Fallon MP, Secretary of State for Defense of the United Kingdom
CSIS is hosting a conversation with The Rt Hon Sir Michael Fallon MP, Secretary of State for Defense of the United Kingdom, on the ways in which the United States and United Kingdom can maximize the benefits of bilateral and multilateral cooperation to combat current and future threats. Looking ahead, where does the UK see its greatest security threats and how are these evolving? In what ways can the United States and United Kingdom strengthen their special defense and intelligence sharing relationship?
The Hudson Institute is welcoming Fox News host Bret Baier to moderate a discussion with Michael Doran, Michael Pregent, David Tafuri, and Hannah Thoburn for an examination of recent Russian interference in Western politics, its historical global precedents, and how the U.S. can mitigate the threat of foreign political disruption in the future
CSIS is hosting a panel to discuss how the U.S. National Security Strategies have differed since September 11, 2001. How has the United States' approach to failed and fragile states, combating terrorism, and fighting the spread drugs changed over the course of the last four national security strategies?
The Heritage Foundation is hosting author of "Strategic Cyber Deterrence: The Active Cyber Defense Option," Scott Jasper, who provides a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. He examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. He also offers answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists.
The American Enterprise Institute is hosting Leon Aron and Rep. Adam Smith (D-WA), ranking member on the House Armed Services Committee to discuss how Washington should thwart the Putin regime’s support of euroskeptic populists, global cyberattacks, interventions in elections, and constant threat of military intervention and how US partners can safeguard themselves against Russian threats of intervention and destabilization.
The Center for 21st Century Security and Intelligence at Brookings is hosting an event focused cybersecurity and cyber deterrence. James Miller, former under secretary of defense for policy, now with Johns Hopkins University Applied Physics Laboratory, will share his expertise on the subject.
The U.S. military must maintain its competitiveness in a rapidly evolving, globalized technology landscape. How can the U.S. military keep its strategic advantage in an era of disruptive change? How can the Department of Defense (DoD) break down barriers to innovation? The Center for a New American Security's Future of Warfare Initiative is hosting a conversation on how DoD can evolve and adapt the force for an uncertain future.
This event hosted by the Carnegie Endowment for International Peace will draw on the expertise of distinguished policy, legal, and technical experts to help clarify the contours of the strategic landscape and the specific challenge of active cyber defense by the private sector.
The fourth Annual Justice Stephen Breyer Lecture hosted by the Foreign Policy program at Brookings and The Hague Institute for Global Justice will seek to address these issues, focusing on the intersection of technology, accountability, and international law.