Cybersecurity

CSIS’s cybersecurity portfolio covers cyber warfare, encryption, military cyber capacity, hacking, financial terrorism, and more to provide the latest recommendations for the digital age.

Image
Photo: MdNubhan/Adobe Stock

Photo: MdNubhan/Adobe Stock

Protecting Subsea Cables: Detect to Deter, Sue to Secure

Subsea cables power global commerce. Though rare, cable attacks impose real costs. But leading technologies are democratizing maritime data and deterring would-be saboteurs. To further deter intentional cable attacks, cable owners should aggressively pursue legal remedies. 

Commentary by Joel Coito — December 12, 2025

Past Events


Experts


Image
Matt Pearl
Director, Strategic Technologies Program
Image
Emily Harding
Vice President, Defense and Security Department; Director, Intelligence, National Security, and Technology Program
Image
Clayton Swope
Deputy Director, Aerospace Security Project and Senior Fellow, Defense and Security Department
Image
Lauryn Williams
Deputy Director and Senior Fellow, Strategic Technologies Program
Image
Joel Coito
Military Fellow, Defense and Security Department