Robert M. Lee

Cybersecurity Policy Fellow

Robert M. Lee is a nonresident national cybersecurity fellow at New America. He is also Founder and CEO of the cybersecurity company Dragos, Inc., a SANS Institute course author and researcher, and a PhD candidate at Kings College London. Lee gained his start in cyber security as an Air Force Cyber Warfare Operations Officer in the U.S. Intelligence Community. He may be found on Twitter @RobertMLee.

All Work

Three Takeaways from the State of Security in Control Systems Survey

The State of Security in Control Systems Today was a SANS survey conducted with 314 ICS community members and was released on June 25th. A f

Barriers to Sharing Cyber Threat Information Within the Critical Infrastructure Community

The sharing of cyber threat data has garnered national level attention, and improved information sharing has been the objective of several p

Cyber Intelligence Part 1: An Introduction to Cyber Intelligence

This is the beginning of a short blog series on the topic of cyber intelligence, its sub-disciplines, and its uses. As an Adjunct Lecturer a

Cyber Intelligence Part 2: Developing Your Cyber Intelligence Analyst Skills

In this edition we will cover more in depth what it means to be a cyber intelligence analyst in terms of understanding intelligence products

Cyber Intelligence Part 3: Cyber Intelligence Collection Operations

The topic of Intelligence Collection Operations sounds inherently military or government based in nature especially with the use of the word

Closing the Case on the Reported 2008 Russian Cyber Attack on the BTC Pipeline

An article released today in Sueddeutsche (the largest German national daily newspaper) by Hakan Tanriverdi revealed new information that fu

Cyber Intelligence Part 4: Cyber Counterintelligence From Theory to Practices

In the previous article, Cyber Intelligence Collection Operations, the types of collection and the types of data that could be obtained were

Cyber Intelligence Part 5: Cyber Threat Intelligence

In the previous blog posts in this series, we looked at cyber intelligence and some of its different focus areas, including intelligence col