Welcome!
To the International Cybersecurity Research Focus at the IFSH.

Scientific Research on Cyber & Cognitive Conflict
Deepen your understanding of global cyber conflicts and their impact on security and politics.

Knowledge Transfer & Policy Work
We work to raise awareness, inform public opinion, and cooperate closely with policymakers and stakeholders.

Annual “Shaping Cybersecurity” Conference
We co-organize yearly conference on cybersecurity, bringing together international experts and policymakers.
News
-

ICS at the German Forum Security Politics by BAKS
-

Policy report on NCII published!
-

Keynote speech at the Constitutional Club in New Delhi
-

Addressing Child Sexual Abuse Materials in peer-reviewed article
-

OpEd on tech-authoritarianism published in Golem.de
-

Keynote at the seminar organized by the Western Institute
-

OpEd for Tagesspiegel Background on LLM-Grooming
-

Preparations for Cyber Agora
-

Podcast available on recent research activities by Matthias Schulze
-

ICS supports research
-

Polish daily newspaper covers policy report on synthetic media abuse
-

Mateusz in the podcast Synthetic Truth
Research Topics

Cyber Conflict
Cyber conflict & the use of offensive cyber operations or active cyber defence as an element of International Relations. Governance of the cyber domain: cyber norms, confidence building measures and international law.

Cyber-Security & Strategies
Cybersecurity & cyber defence best-practices: vulnerability disclosure, cyber ranges, bug bounties and the evolution of security controls. Peace and security implications of the cybercrime ecosystem & ransomware. Analysing cyber strategies of allies and adversaries.

Hybrid Threats & Information Warfare
Information warfare, cognitive threats, memetic warfare and the use of synthetic media to influence democracies.
Subscribe to our Newsletter

Cyber & Cognitive Conflict Compass (C4) Substack
Weekly update on cyber and information warfare events around the globe, cyber-policy developments, new academic papers, and noteworthy IT-security news. Hosted via Substack.