Currently:
- Managing military software supply chains risk
- Mitigating US tech dependencies
- Biotechnology + defense
Author of "Building Bridges in Cyber Diplomacy" (2024). She/her.
Christoph Lobmeyer
@clotildebomont.bsky.social
Colin Topping
@jamesshires.bsky.social
John Scott
John Speed Meyers
Jörg Eschweiler
Marc Lanouette
Philip Engelmartin
Sara Ann Bracket
Sebastian Lange
Simon Stanley
Full text: www.swp-berlin.org/publikation/... /10+fin
Christoph Lobmeyer
@clotildebomont.bsky.social
Colin Topping
@jamesshires.bsky.social
John Scott
John Speed Meyers
Jörg Eschweiler
Marc Lanouette
Philip Engelmartin
Sara Ann Bracket
Sebastian Lange
Simon Stanley
Full text: www.swp-berlin.org/publikation/... /10+fin
@amyertan.bsky.social
@andrewdwyer.bsky.social /9
@amyertan.bsky.social
@andrewdwyer.bsky.social /9
The inconvenient truth: managing software supply chain risk is hard. There is no easy fix; instead, leaders must invest significant resources and take various steps simultaneously. /7
The inconvenient truth: managing software supply chain risk is hard. There is no easy fix; instead, leaders must invest significant resources and take various steps simultaneously. /7
II. The armed forces must set up their own software supply chain risk management. This involves setting up responsibilities and internal procedures.../5
II. The armed forces must set up their own software supply chain risk management. This involves setting up responsibilities and internal procedures.../5
In a nutshell, three steps are necessary: /4
In a nutshell, three steps are necessary: /4
1. Industrial espionage,
2. Political espionage, and
3. Sabotage.
Even without an attacker, inadvertent mistakes by suppliers (or their suppliers) can disrupt operations and cause significant damage. /3
1. Industrial espionage,
2. Political espionage, and
3. Sabotage.
Even without an attacker, inadvertent mistakes by suppliers (or their suppliers) can disrupt operations and cause significant damage. /3
English paper: www.swp-berlin.org/en/publicati... /9
English paper: www.swp-berlin.org/en/publicati... /9
I. Gather information about cyber threats.
II. Create legal protections for security researchers.
III. Investing in the Cybersecurity Ecosystem. /8
I. Gather information about cyber threats.
II. Create legal protections for security researchers.
III. Investing in the Cybersecurity Ecosystem. /8
Scenario 1: Washington ceases financial support for cybersecurity projects.
Scenario 2: The US government changes its political priorities. /6
Scenario 1: Washington ceases financial support for cybersecurity projects.
Scenario 2: The US government changes its political priorities. /6
3. The US Armed Forces gather intelligence on cyber threats.
4. The US government funds vulnerability databases.
5. The US government supports the security of open source software. /5
3. The US Armed Forces gather intelligence on cyber threats.
4. The US government funds vulnerability databases.
5. The US government supports the security of open source software. /5
1. US companies dominate the market for cybersecurity applications. /4
1. US companies dominate the market for cybersecurity applications. /4