We perform research, studies, consultation, scientific and professional activities in the following areas, but not limited to:

Cyber Warfare and its Countermeasures

Cyber Governance and Harmony

Cyber Weapons and Deterrence

Cybersecurity Awareness, Training, and Education

Corporate Cyber Espionage and Countermeasures

Cybersecurity and Defense Policy

Combatting Cyberterrorism

Addressing Cyber Risks, Threats, and Vulnerabilities

Cybersecurity of Critical Information Infrastructure
