Welcome!
To the International Cybersecurity Research Focus at the IFSH.

Scientific Research on Cyber & Cognitive Conflict
Deepen your understanding of global cyber conflicts and their impact on security and politics.

Knowledge Transfer & Policy Work
We work to raise awareness, inform public opinion, and cooperate closely with policymakers and stakeholders.

Annual “Shaping Cybersecurity” Conference
We co-organize yearly conference on cybersecurity, bringing together international experts and policymakers.
News
-

Exploring Global Lessons in Cybersecurity
-

ICS as part of the IFSH event format “Kurz Erklärt”
-

When Silicon Valley commoditizes human robots
-

Discussion Digital Threats and the Human Element: From EU Policies to Everyday Life
-

Peer-reviewed article on deepfakes
-

Mateusz speaking on the risks of misusing LLMs
-

Arms control in crisis: Technological and security challenges
-

Interviews on Drones & hybrid warfare tactics
-

OpEd on strenghtening social resilience
-

“Reverse Brussels effect”? Mateusz’s OpEd in The Loop
-

OpEd on AI and why Leo XIV chose this name
-

Matthias in podcast “Was ist da los?”
Research Topics

Cyber Conflict
Cyber conflict & the use of offensive cyber operations or active cyber defence as an element of International Relations. Governance of the cyber domain: cyber norms, confidence building measures and international law.

Cyber-Security & Strategies
Cybersecurity & cyber defence best-practices: vulnerability disclosure, cyber ranges, bug bounties and the evolution of security controls. Peace and security implications of the cybercrime ecosystem & ransomware. Analysing cyber strategies of allies and adversaries.

Hybrid Threats & Information Warfare
Information warfare, cognitive threats, memetic warfare and the use of synthetic media to influence democracies.
Subscribe to our Newsletter

Cyber & Cognitive Conflict Compass (C4) Substack
Weekly update on cyber and information warfare events around the globe, cyber-policy developments, new academic papers, and noteworthy IT-security news. Hosted via Substack.