shopify stats

ICIT Research – Executive Function: Leveraging the 2022 President Management Agenda to Increase Efficiency, Improve Trust, and Instill Resiliency

The President’s Management Agenda (PMA) defines Government-wide management priorities [...]

By |2022-09-27T14:16:29+00:00September 22nd, 2022|Cybersecurity Research, ICIT Publications|Comments Off on ICIT Research – Executive Function: Leveraging the 2022 President Management Agenda to Increase Efficiency, Improve Trust, and Instill Resiliency

August 2022 Cyber Legislation and Federal Agency Initiatives Briefing

The monthly “ICIT Cyber Legislation and Federal Agency [...]

By |2022-09-20T19:40:27+00:00September 20th, 2022|Cybersecurity Research, ICIT Publications|Comments Off on August 2022 Cyber Legislation and Federal Agency Initiatives Briefing

Research Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention

ICIT Certified Content: This content has been reviewed by [...]

By |2022-09-06T16:29:46+00:00August 17th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Research Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention

ICIT Fellow Perspective Essay: Avoid Sisyphus – Progressing Beyond the Motion(s) of Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-08-05T15:11:18+00:00August 2nd, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Fellow Perspective Essay: Avoid Sisyphus – Progressing Beyond the Motion(s) of Cybersecurity

June 2022 Cyber Legislation and Federal Agency Initiatives Briefing

The monthly “ICIT Cyber Legislation and Federal Agency [...]

By |2022-09-20T19:29:57+00:00July 5th, 2022|Cybersecurity Research, ICIT Publications|Comments Off on June 2022 Cyber Legislation and Federal Agency Initiatives Briefing

ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

ICIT Certified Content: This content has been reviewed by ICIT [...]

By |2022-06-28T17:07:17+00:00June 28th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:06:56+00:00May 25th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

The State of Cybersecurity in K-12 & Higher Education

By Mack Peterman, Regan McGovern, Jordan Christian, Lexi Rutkowski, [...]

By |2022-06-22T15:53:20+00:00May 16th, 2022|Academic Initiative, Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The State of Cybersecurity in K-12 & Higher Education

ICIT Certified Content: Software Bill of Materials (SBOMs) – Reducing Open Source Risk Throughout the Development, Delivery, and Deployment of Software

ICIT Certified Content: This content has been reviewed by [...]

By |2022-05-04T21:25:24+00:00May 4th, 2022|Cybersecurity Research, Frameworks & Guidance, Thought Leadership|Comments Off on ICIT Certified Content: Software Bill of Materials (SBOMs) – Reducing Open Source Risk Throughout the Development, Delivery, and Deployment of Software

ICIT Certified Content: Making Better Cyber Risk Decisions – Architecting the Choices

ICIT Certified Content: This content has been reviewed by [...]

By |2022-05-04T21:26:41+00:00May 4th, 2022|Cybersecurity Research, Featured, Thought Leadership|Comments Off on ICIT Certified Content: Making Better Cyber Risk Decisions – Architecting the Choices

ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Securing U.S. critical infrastructures and democratic institutions requires whole-of-government [...]

By |2022-05-17T21:21:42+00:00March 22nd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

At the height of the Cold War, former CIA Chief [...]

By |2022-03-03T21:52:08+00:00March 3rd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

America is defined from its “Melting Pot” shared culture [...]

By |2022-03-15T20:43:44+00:00February 26th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:07:03+00:00February 4th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-02-01T00:42:11+00:00January 28th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Uncategorized|Comments Off on ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

Nation state-sponsored threat actors develop, disseminate, and deploy ransomware [...]

By |2022-02-19T16:39:55+00:00December 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT Certified Content: The 2021 Devo SOC Performance Report™ [...]

By |2021-12-16T20:20:00+00:00December 16th, 2021|Cybersecurity Research, ICIT Publications, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT Virtual Briefing: Optimizing SOC Operations

Security operations centers (SOC) are the backbone of the [...]

By |2021-12-16T20:16:02+00:00October 28th, 2021|Cybersecurity Research, Front Page Publication, Latest Posts, Thought Leadership|Comments Off on ICIT Virtual Briefing: Optimizing SOC Operations

ICIT Certified Content: 2021 Threat Hunting Report

ICIT Certified Content: This Blackberry publication contains expert insights [...]

By |2021-10-27T16:19:18+00:00October 27th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Threat Hunting Report

Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

In the race to create a Covid-19 vaccine by [...]

By |2021-09-29T19:16:53+00:00September 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

ICIT Virtual Briefing: Secure Automation for Mission Readiness

Federal agencies have increased focus on Intelligent Automation (IA) [...]

By |2021-10-18T17:13:19+00:00September 23rd, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership, Uncategorized|Comments Off on ICIT Virtual Briefing: Secure Automation for Mission Readiness

ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

Zero trust isn’t a new concept, although it’s certainly [...]

By |2021-10-18T17:13:43+00:00September 8th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches [...]

By |2021-09-23T14:12:33+00:00September 7th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

As a leader of critical infrastructure cybersecurity research, ICIT [...]

By |2020-11-30T15:16:56+00:00November 12th, 2020|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Physical Security, Technology Assessments, Thought Leadership|Comments Off on The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

ICIT On-Demand- 2020 Election Resiliency: Integrity vs. Disruption

Panelists Include: Benjamin [...]

By |2021-02-22T19:29:42+00:00September 23rd, 2020|Cybersecurity Research, Physical Security, Sector Specific, Technology Assessments, Thought Leadership|Comments Off on ICIT On-Demand- 2020 Election Resiliency: Integrity vs. Disruption

ICIT On-Demand – Interactive Security Testing, DevSecOps, and NIST SP 800-53 Rev. 5

Panelists Include: Dr. Ron Ross, Fellow, [...]

Weapons of Mass Disruption: An Assessment of the Threat Disruptionware Poses to Energy Sector Continuity

Previously, cyberattacks resulting in the targeted disruption of electricity [...]

The Healthcare Research Security Pandemic: Threats to Patient Care, National Security, and the Economy

Today more than ever, millions of lives depend on [...]

ICIT On-Demand – The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization

Panelists Include: - Dave Summit, CISO, [...]

ICIT Fellow Perspective – Moving Target Defense: “Staying Ahead of the Enemy”

In continued support of our mission to cultivate a [...]

The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization

ICIT Solution Insights offers use case based education [...]

The Business Value of a Diverse InfoSec Team: A Discussion on How Gender, Racial, Cognitive, and LGBTQ Diversity Improves Cybersecurity Outcomes

ICIT Diversity in Cybersecurity National security and critical infrastructure [...]

The Road to Mobility: The 2020 Guide to Trends and Technology for Smart Cities and Transportation

ICIT Certified Content: This Blackberry publication contains expert insights [...]

The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments

In "The Rise of Disruptionware: A Cyber-Physical Threat to [...]

By |2019-09-23T10:58:48+00:00September 22nd, 2019|Cybersecurity Research, ICIT Publications, Physical Security|0 Comments

D.C. Takes On Energy Sector Threats: A Summary of Recent Agency and Congressional Efforts

Cybersecurity researchers often walk a fine line between objectively [...]

By |2019-09-05T12:05:26+00:00September 5th, 2019|Cybersecurity Research, ICIT Publications, Sector Specific|0 Comments

An Insight into the Current Security Posture of Healthcare IT: A National Security Concern

This spring, The Institute for Critical Infrastructure Technology (ICIT) [...]

By |2019-10-10T17:50:05+00:00July 7th, 2019|Cybersecurity Research, Sector Specific|0 Comments
Go to Top