Videos & Interviews

ICIT Insights: Improving Resiliency with User Behavior Analytics

ICIT Fellow Insights: Securing User Credentials – A Cyber Hygiene

ICIT Fellow Insights: The State of Cybersecurity Operations 2016

ICIT Fellow Insights: Why Leadership Should Be the Top Priority

Why Industrial Control Systems are the most Important – and Complex – to Secure

ICIT Fellow Insights: Why OPM’s Breach was a Game Changer, Risk to the Victims, & Recommendations

Proposed Cyber Legislation And Their Impact On The Security Community

Targeted Cyber Attacks Against Critical Infrastructures

ICIT Al Jazeera Interview – James Scott Discusses WannaCry Ransomware Attack

Is hacking the election easy?

Congressional Briefing: Strengthening Election Cybersecurity

ICIT Brief: Hacking Elections is Easy!

ICIT Brief: Cyber Hygiene in the Digital Age

ICIT Senate Briefing: Layered Security Strategies for Health Sector Organizations

ICIT Senate Briefing – The Deep Web Exploitation of Health Sector Breach Victims

ICIT Briefing: Threat Intelligence Optimization

ICIT Briefing – Cyber and Beyond: The Inner Workings of Chinese Espionage

ICIT Briefing: China’s Espionage Dynasty – Economic Death by a Thousand Cuts

ICIT Forum 2016: How Analytics & Artificial Intelligence are Enabling Next-Generation Cybersecurity

ICIT Forum 2016: Cyber Hygiene Post OPM – Improvements, Failures and Opportunities

ICIT Forum 2016: The Gryphon-X Project – NASA Unleashes the New Standard in Cybersecurity

ICIT Forum 2016: Critical Infrastructure Resiliency- Cyber Threats and Priorities

ICIT Forum 2016: Security in a Connected World: SmartCities, Transportation & IoT

ICIT Forum 2016: Defending a Multinational Critical Infrastructure Provider

ICIT Forum 2016: Closing Keynote by Tony Scott, Federal CIO

ICIT Forum 2016: Why Resiliency Requires DevOps

ICIT Forum 2016: Why Threat Intelligence without Relevance Isn’t Smart

ICIT Forum 2016: Opening Keynote by Richard Ledgett, Deputy Director, NSA