shopify stats

ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

ICIT Certified Content: This content has been reviewed by ICIT [...]

By |2022-06-28T17:07:17+00:00June 28th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:06:56+00:00May 25th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

The State of Cybersecurity in K-12 & Higher Education

By Mack Peterman, Regan McGovern, Jordan Christian, Lexi Rutkowski, [...]

By |2022-06-22T15:53:20+00:00May 16th, 2022|Academic Initiative, Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The State of Cybersecurity in K-12 & Higher Education

ICIT Certified Content: Software Bill of Materials (SBOMs) – Reducing Open Source Risk Throughout the Development, Delivery, and Deployment of Software

ICIT Certified Content: This content has been reviewed by [...]

By |2022-05-04T21:25:24+00:00May 4th, 2022|Cybersecurity Research, Frameworks & Guidance, Thought Leadership|Comments Off on ICIT Certified Content: Software Bill of Materials (SBOMs) – Reducing Open Source Risk Throughout the Development, Delivery, and Deployment of Software

ICIT Certified Content: Making Better Cyber Risk Decisions – Architecting the Choices

ICIT Certified Content: This content has been reviewed by [...]

By |2022-05-04T21:26:41+00:00May 4th, 2022|Cybersecurity Research, Featured, Thought Leadership|Comments Off on ICIT Certified Content: Making Better Cyber Risk Decisions – Architecting the Choices

ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Securing U.S. critical infrastructures and democratic institutions requires whole-of-government [...]

By |2022-05-17T21:21:42+00:00March 22nd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

At the height of the Cold War, former CIA Chief [...]

By |2022-03-03T21:52:08+00:00March 3rd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

America is defined from its “Melting Pot” shared culture [...]

By |2022-03-15T20:43:44+00:00February 26th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:07:03+00:00February 4th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-02-01T00:42:11+00:00January 28th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Uncategorized|Comments Off on ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

Nation state-sponsored threat actors develop, disseminate, and deploy ransomware [...]

By |2022-02-19T16:39:55+00:00December 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

ICIT Certified Content: 2021 CISO DDoS Handbook

ICIT Certified Content: This Mazebolt whitepaper contains expert insights [...]

By |2021-12-27T17:35:46+00:00December 27th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 CISO DDoS Handbook

ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT Certified Content: The 2021 Devo SOC Performance Report™ [...]

By |2021-12-16T20:20:00+00:00December 16th, 2021|Cybersecurity Research, ICIT Publications, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT Virtual Briefing: Optimizing SOC Operations

Security operations centers (SOC) are the backbone of the [...]

By |2021-12-16T20:16:02+00:00October 28th, 2021|Cybersecurity Research, Front Page Publication, Latest Posts, Thought Leadership|Comments Off on ICIT Virtual Briefing: Optimizing SOC Operations

ICIT Certified Content: 2021 Threat Hunting Report

ICIT Certified Content: This Blackberry publication contains expert insights [...]

By |2021-10-27T16:19:18+00:00October 27th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Threat Hunting Report

Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

In the race to create a Covid-19 vaccine by [...]

By |2021-09-29T19:16:53+00:00September 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

ICIT Virtual Briefing: Secure Automation for Mission Readiness

Federal agencies have increased focus on Intelligent Automation (IA) [...]

By |2021-10-18T17:13:19+00:00September 23rd, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership, Uncategorized|Comments Off on ICIT Virtual Briefing: Secure Automation for Mission Readiness

ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

Zero trust isn’t a new concept, although it’s certainly [...]

By |2021-10-18T17:13:43+00:00September 8th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches [...]

By |2021-09-23T14:12:33+00:00September 7th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

As a leader of critical infrastructure cybersecurity research, ICIT [...]

By |2020-11-30T15:16:56+00:00November 12th, 2020|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Physical Security, Technology Assessments, Thought Leadership|Comments Off on The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

ICIT On-Demand- 2020 Election Resiliency: Integrity vs. Disruption

Panelists Include: Benjamin [...]

By |2021-02-22T19:29:42+00:00September 23rd, 2020|Cybersecurity Research, Physical Security, Sector Specific, Technology Assessments, Thought Leadership|Comments Off on ICIT On-Demand- 2020 Election Resiliency: Integrity vs. Disruption

ICIT On-Demand – Interactive Security Testing, DevSecOps, and NIST SP 800-53 Rev. 5

Panelists Include: Dr. Ron Ross, Fellow, [...]

Weapons of Mass Disruption: An Assessment of the Threat Disruptionware Poses to Energy Sector Continuity

Previously, cyberattacks resulting in the targeted disruption of electricity [...]

The Healthcare Research Security Pandemic: Threats to Patient Care, National Security, and the Economy

Today more than ever, millions of lives depend on [...]

ICIT On-Demand – The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization

Panelists Include: - Dave Summit, CISO, [...]

ICIT Fellow Perspective – Moving Target Defense: “Staying Ahead of the Enemy”

In continued support of our mission to cultivate a [...]

The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization

ICIT Solution Insights offers use case based education [...]

The Business Value of a Diverse InfoSec Team: A Discussion on How Gender, Racial, Cognitive, and LGBTQ Diversity Improves Cybersecurity Outcomes

ICIT Diversity in Cybersecurity National security and critical infrastructure [...]

The Road to Mobility: The 2020 Guide to Trends and Technology for Smart Cities and Transportation

ICIT Certified Content: This Blackberry publication contains expert insights [...]

The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments

In "The Rise of Disruptionware: A Cyber-Physical Threat to [...]

By |2019-09-23T10:58:48+00:00September 22nd, 2019|Cybersecurity Research, ICIT Publications, Physical Security|0 Comments

D.C. Takes On Energy Sector Threats: A Summary of Recent Agency and Congressional Efforts

Cybersecurity researchers often walk a fine line between objectively [...]

By |2019-09-05T12:05:26+00:00September 5th, 2019|Cybersecurity Research, ICIT Publications, Sector Specific|0 Comments

An Insight into the Current Security Posture of Healthcare IT: A National Security Concern

This spring, The Institute for Critical Infrastructure Technology (ICIT) [...]

By |2019-10-10T17:50:05+00:00July 7th, 2019|Cybersecurity Research, Sector Specific|0 Comments
Go to Top