Strategic Technologies Program

The Strategic Technologies Program (STP) conducts research on the social, economic, and security challenges created by emerging technologies to inform effective policy solutions and best practices

The STP’s research agenda includes cybersecurity, emerging technologies and innovation, frameworks for digital governance, 5G networks and telecommunications, surveillance and privacy, and the role of technology in power and conflict.

The STP brings together technologists, policymakers, civil society, and business leaders from around the world. In a time when disruptive technologies are reshaping the global economy and society, the program provides pragmatic and data-driven analysis and policy recommendations to face these challenges.

Keep up to date with our work on X (@CSIS_Tech) or subscribe to our bi-weekly newsletter. For more information on past and present projects, contact strategictech@csis.org.

Subscribe to our newsletter

Stay up to date on the latest fromStrategic Technologies Program

Select Your Subscriptions*
Image
Tech Update Newsletter

A bi-weekly roundup of the technology stories driving the news, plus updates from the Strategic Technologies Program.

Image
The Innovation Hub Newsletter

Tracking innovation and technology policy — bi-weekly analysis and updates from the Renewing American Innovation program.

Image
AI and Advanced Insights

A monthly update from the Wadhwani Center analyzing recent emerging technology news and highlighting the latest developments at the Center. 

Image
Photo: xy/Adobe Stock

Regular insights from EST President Navin Girishankar on the latest developments in economic security and technology, paired with sharp analysis and key takeaways from across the department’s research and initiatives.

CAPTCHA

Program Queries

Media Queries

Featured Video


Outdated Rules, New Space Race: Modernizing LEO Spectrum Policy

LEO satellites are redefining global communications and security, but U.S. innovation is being slowed by decades-old spectrum rules. CSIS’s Matt Pearl and Karina Perez of CCIA explain why updating these regulations is critical to expanding connectivity and keeping U.S. space leadership on top.

See Video

Featured Project


Commission on U.S. Cyber Force Generation

The CSIS Commission on U.S. Cyber Force Generation will convene leading experts to examine how the United States can best build a dedicated cyber service.

View Page

AllStrategic Technologies Program Content


Filter by

1 - 10 of 920 results

Protecting Subsea Cables: Detect to Deter, Sue to Secure

Subsea cables power global commerce. Though rare, cable attacks impose real costs. But leading technologies are democratizing maritime data and deterring would-be saboteurs. To further deter intentional cable attacks, cable owners should aggressively pursue legal remedies. 

Commentary by Joel Coito— December 12, 2025

Sovereign Cloud–Sovereign AI Conundrum: Policy Actions to Achieve Prosperity and Security

Rising geopolitical competition, digital sovereignty, and the allure of AI are driving countries to adopt sovereign cloud and sovereign AI. Yet sovereign controls bring higher costs, slower growth, and less innovation—making the economies that use them less competitive.

Report by Bill Whyman— December 4, 2025

Cache Me If You Can

Invisible Infrastructure: How Spectrum and 5G Shape Global Power

Diane Rinaldo joins Matt Pearl to discuss spectrum, 5G security, and U.S.–China tech competition.

Podcast Episode by Matt Pearl— December 3, 2025

Image
Photo: CSIS

Keeping China Grounded: Ensuring Long-Term U.S. Tech Leadership in Low Earth Orbit

The Strategic Technologies Program hosts this event discussing how the United States can sustain leadership in Low Earth Orbit (LEO) amid intensifying global competition.

Event— December 2, 2025

China’s Weaponization of Global Cyber Supply Chains

China's military-civil fusion turns global supply chains into a battlefield. The CCP fuses state power and private enterprise to embed cyber vulnerabilities and preposition access worldwide, threatening U.S. networks long before conflict begins.

Blog Post by Peter Dohr— December 1, 2025

Cache Me If You Can

Views from the Cyber Trenches: Understanding U.S. Military Cyber Dynamics

Lauryn Williams is joined by three retired cyber operators—Col. Sean Kern, LtCol Tony Siciliano, and Col. Ben Ring—for a candid conversation about the real conditions inside the cyber trenches.

Podcast Episode by Lauryn Williams— November 25, 2025

Image
Photo: CSIS

It’s Time for AI Policy to Get Serious About the AI Adoption Gap

In this latest piece, Shiva Goel and Matt Pearl argue that U.S. policy needs to double-down on AI adoption and propose a solution: rewarding colleges and universities that launch AI Adoption Accelerators to promote deployment in their local communities.

Commentary by Shiva Goeland Matt Pearl— November 20, 2025

Lauryn Williams in The Washington Post: The cyberattacks are coming. Will anyone be there to stop them?

“Trump administration job cuts worsen U.S. vulnerabilities to China and other cyber-adversaries,” Williams warns.

Commentary by Lauryn Williams— November 20, 2025

Force Design for the Twenty-First Century Fight: U.S. Cyber Force Lessons from China’s Strategic Support Forces

As the United States debates the creation of a standalone Cyber Force, it should learn the lessons China’s decade-long Strategic Support Force experiment offers in integrating space, cyber, and information capabilities for a new era of warfare.

Commentary by Lauryn Williams— November 19, 2025

The Invisible Shield: Wireless Spectrum and U.S. National Security

This discussion will convene experts from government, industry, and academia to explore how the United States can strengthen its leadership in wireless technologies and ensure secure, efficient spectrum use for next-generation applications. 

Event— November 12, 2025