-
CENTRES
Progammes & Centres
Location
-
FORUMS
- Raisina Dialogue
- Cape Town Conversation
- Sagarmanthan: The Great Oceans Dialogue
- Yerevan Dialogue
- The Energy Transition Dialogues
- CyFy
- CyFy Africa
- Kigali Global Dialogue
- U.S. Indo-Pacific Strategy: North-Eastern Dialogues
- BRICS Academic Forum
- Colaba Conversation
- Asian Forum on Global Governance
- Dhaka Global Dialogue
- Kalpana Chawla Annual Space Policy Dialogue
- Tackling Insurgent Ideologies
- Climate Action Champions Network
ICC’s arrest warrants against Israeli leaders
Sri Lanka parliamentary elections: Assessing implications for India
Behind the making of the global nuclear (dis)order
What to expect in 2025: Looming talks for a brooding peace
Breaking the Shackles of Geography
Corruption and purge in the PLA: Apprehension and distrust
EU versus Russia in Georgia’s high-stakes election
From Chancay to Shanghai: China undercuts the US in Peru
Russia and North Korea Join Forces in the War Against Ukraine: Global Ramifications
Russia-Ukraine War - ATACMS vs Oreshniks Amid Escalation Fears
Saudi Arabia, a Kingdom in Transition
The Trump factor and Iran’s choices
From Engagement to Competitive Co-Existence: The U.S. and its China Challenge
The escalation matrix in Ukraine
Dominance, Competition, and Adaptation: The US Quest for a Strategic Trifecta in the Indian Ocean
What lies ahead: Understanding Trump’s return to power
India-China border agreement: A case for military buildup
US defence policy under Trump 2.0
What Trump 2.0 could mean for Tokyo?
Trump 2.0, unpredictability, and a Middle East on edge
Christmas for China hawks: Measuring Trump’s stance on China
Trump's Re-election: Assessing implications for South Asia
Trump’s transactional pragmatism may auger well for Africa
Trump 2.0 and European Security
Trump’s tech policies: Deregulation, decoupling and disruption
What Trump 2.0 means for development partnerships and the Global South
An ominous threat of escalation on the Ukraine war front
Trump 2.0 and the Indo-Pacific: Balancing economic and security imperatives