Welcome!
To the International Cybersecurity Research Focus at the IFSH.

Scientific Research on Cyber & Cognitive Conflict
Deepen your understanding of global cyber conflicts and their impact on security and politics.

Knowledge Transfer & Policy Work
We work to raise awareness, inform public opinion, and cooperate closely with policymakers and stakeholders.

Annual “Shaping Cybersecurity” Conference
We co-organize yearly conference on cybersecurity, bringing together international experts and policymakers.
News
-

Conference in King’s College in London
-

Annual Peace Report published!
-

Article on Cyber- and Information-Wars in “Auftrag”
-

Matthias at the symposium of Evangelic Church in Germany
-

Matthias interviewed by LOAD e.V.
-

Our workshop on cybersecurity and cognitive warfare
-

Shaping Cybersecurity 2025: „Stronger Together: Cyber Capabilities for vigilant Democracies”
-

OpEd on US tech-authoritarianism and EU dependencies by Heise.de
-

OpEd on synthetic media abuse in hAI Magazine
-

OpEd on NCII published by EUObserver
-

Peer-reviewed article published in “Politics & Policy”
-

Webinar with the students of the University of Warsaw
Research Topics

Cyber Conflict
Cyber conflict & the use of offensive cyber operations or active cyber defence as an element of International Relations. Governance of the cyber domain: cyber norms, confidence building measures and international law.

Cyber-Security & Strategies
Cybersecurity & cyber defence best-practices: vulnerability disclosure, cyber ranges, bug bounties and the evolution of security controls. Peace and security implications of the cybercrime ecosystem & ransomware. Analysing cyber strategies of allies and adversaries.

Hybrid Threats & Information Warfare
Information warfare, cognitive threats, memetic warfare and the use of synthetic media to influence democracies.
Subscribe to our Newsletter

Cyber & Cognitive Conflict Compass (C4) Substack
Weekly update on cyber and information warfare events around the globe, cyber-policy developments, new academic papers, and noteworthy IT-security news. Hosted via Substack.