shopify stats

May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:06:56+00:00May 25th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

ICIT Fellows Perspective Essay: Concise and Consolidated Language in Vulnerability Management Programs

In continued support of our mission to cultivate a [...]

By |2022-06-22T15:53:53+00:00May 4th, 2022|Featured, Frameworks & Guidance, Front Page Publication, Latest Posts, Thought Leadership|Comments Off on ICIT Fellows Perspective Essay: Concise and Consolidated Language in Vulnerability Management Programs

ICIT Certified Content: Making Better Cyber Risk Decisions – Architecting the Choices

ICIT Certified Content: This content has been reviewed by [...]

By |2022-05-04T21:26:41+00:00May 4th, 2022|Cybersecurity Research, Featured, Thought Leadership|Comments Off on ICIT Certified Content: Making Better Cyber Risk Decisions – Architecting the Choices

ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Securing U.S. critical infrastructures and democratic institutions requires whole-of-government [...]

By |2022-05-17T21:21:42+00:00March 22nd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

At the height of the Cold War, former CIA Chief [...]

By |2022-03-03T21:52:08+00:00March 3rd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

America is defined from its “Melting Pot” shared culture [...]

By |2022-03-15T20:43:44+00:00February 26th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreachIn [...]

By |2021-12-06T23:14:59+00:00December 6th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

By Don Maclean, ICIT Fellow and Chief Cyber Security [...]

By |2021-12-07T14:20:38+00:00November 17th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security

Moving applications and development to the cloud has delivered [...]

By |2021-07-09T12:48:51+00:00May 26th, 2021|Featured, ICIT Publications, Thought Leadership|Comments Off on ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security

AFCEA Introduces the Cyber Edge Writing Contest: The Future of Cyber Warfighting

AFCEA International’s Cyber Edge Writing Contest [...]

By |2021-03-09T14:21:27+00:00December 9th, 2020|Featured, News & Announcements|Comments Off on AFCEA Introduces the Cyber Edge Writing Contest: The Future of Cyber Warfighting

Congratulations to our Executive Director, Joyce Hunter who was named to The Most Influential People in Security 2020 in the cybersecurity category!

The most influenctial people in security 2020. Who [...]

By |2020-11-26T17:11:47+00:00November 25th, 2020|Featured, News & Announcements|Comments Off on Congratulations to our Executive Director, Joyce Hunter who was named to The Most Influential People in Security 2020 in the cybersecurity category!

Congratulations to ICIT Contr. Venice Goodwine, USDA for Winning Cybersecurity Executive of the Year

ICIT would like to congratulate Venice Goodwine, CISSP, [...]

By |2020-11-25T16:20:03+00:00November 25th, 2020|Featured, News & Announcements|Comments Off on Congratulations to ICIT Contr. Venice Goodwine, USDA for Winning Cybersecurity Executive of the Year

ICIT Executive Director Joyce Hunter on Today’s Cybersecurity Challenges

DLT Solutions recently sat down for an interview [...]

By |2020-11-25T16:05:37+00:00November 25th, 2020|Featured, News & Announcements|Comments Off on ICIT Executive Director Joyce Hunter on Today’s Cybersecurity Challenges

The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

As a leader of critical infrastructure cybersecurity research, ICIT [...]

By |2020-11-30T15:16:56+00:00November 12th, 2020|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Physical Security, Technology Assessments, Thought Leadership|Comments Off on The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction
Go to Top