shopify stats

Announcement | CRC Press Publishes Securing the Nation’s Critical Infrastructures

AVAILABLE FOR PRE-ORDER NOW! CRC Press, a division [...]

By |2022-11-03T13:29:28+00:00October 22nd, 2022|Front Page Publication, News & Announcements, Uncategorized|Comments Off on Announcement | CRC Press Publishes Securing the Nation’s Critical Infrastructures

Research Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention

ICIT Certified Content: This content has been reviewed by [...]

By |2022-09-06T16:29:46+00:00August 17th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Research Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention

ICIT Fellow Perspective Essay: Avoid Sisyphus – Progressing Beyond the Motion(s) of Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-08-05T15:11:18+00:00August 2nd, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Fellow Perspective Essay: Avoid Sisyphus – Progressing Beyond the Motion(s) of Cybersecurity

ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

ICIT Certified Content: This content has been reviewed by ICIT [...]

By |2022-06-28T17:07:17+00:00June 28th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:06:56+00:00May 25th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

The State of Cybersecurity in K-12 & Higher Education

By Mack Peterman, Regan McGovern, Jordan Christian, Lexi Rutkowski, [...]

By |2022-06-22T15:53:20+00:00May 16th, 2022|Academic Initiative, Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The State of Cybersecurity in K-12 & Higher Education

ICIT Fellows Perspective Essay: Concise and Consolidated Language in Vulnerability Management Programs

In continued support of our mission to cultivate a [...]

By |2022-06-22T15:53:53+00:00May 4th, 2022|Featured, Frameworks & Guidance, Front Page Publication, Latest Posts, Thought Leadership|Comments Off on ICIT Fellows Perspective Essay: Concise and Consolidated Language in Vulnerability Management Programs

ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Securing U.S. critical infrastructures and democratic institutions requires whole-of-government [...]

By |2022-05-17T21:21:42+00:00March 22nd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

ICIT Fellow Perspective -The Role of Cybersecurity Leaders as Educators

In continued support of our mission to cultivate a [...]

By |2022-05-17T21:22:07+00:00March 18th, 2022|Front Page Publication, Thought Leadership, Uncategorized|Comments Off on ICIT Fellow Perspective -The Role of Cybersecurity Leaders as Educators

Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

At the height of the Cold War, former CIA Chief [...]

By |2022-03-03T21:52:08+00:00March 3rd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

America is defined from its “Melting Pot” shared culture [...]

By |2022-03-15T20:43:44+00:00February 26th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

ICIT’s Bright Minds Q&A Series – Developing Proactive, Responsive, and Ethical Artificial Intelligence Policies

By Joyce Hunter, ICIT Executive Director In [...]

By |2022-02-24T01:39:23+00:00February 24th, 2022|Front Page Publication, ICIT Publications, Latest Posts, Technology Assessments, Thought Leadership, Uncategorized|Comments Off on ICIT’s Bright Minds Q&A Series – Developing Proactive, Responsive, and Ethical Artificial Intelligence Policies

The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:07:03+00:00February 4th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-02-01T00:42:11+00:00January 28th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Uncategorized|Comments Off on ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

Nation state-sponsored threat actors develop, disseminate, and deploy ransomware [...]

By |2022-02-19T16:39:55+00:00December 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreachIn [...]

By |2021-12-06T23:14:59+00:00December 6th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

By Don Maclean, ICIT Fellow and Chief Cyber Security [...]

By |2021-12-07T14:20:38+00:00November 17th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

ICIT Virtual Briefing: Optimizing SOC Operations

Security operations centers (SOC) are the backbone of the [...]

By |2021-12-16T20:16:02+00:00October 28th, 2021|Cybersecurity Research, Front Page Publication, Latest Posts, Thought Leadership|Comments Off on ICIT Virtual Briefing: Optimizing SOC Operations

ICIT Certified Content: 2021 Threat Hunting Report

ICIT Certified Content: This Blackberry publication contains expert insights [...]

By |2021-10-27T16:19:18+00:00October 27th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Threat Hunting Report

Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

In the race to create a Covid-19 vaccine by [...]

By |2021-09-29T19:16:53+00:00September 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

ICIT Virtual Briefing: Secure Automation for Mission Readiness

Federal agencies have increased focus on Intelligent Automation (IA) [...]

By |2021-10-18T17:13:19+00:00September 23rd, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership, Uncategorized|Comments Off on ICIT Virtual Briefing: Secure Automation for Mission Readiness

ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

Zero trust isn’t a new concept, although it’s certainly [...]

By |2021-10-18T17:13:43+00:00September 8th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches [...]

By |2021-09-23T14:12:33+00:00September 7th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

Announcement | CRC Press to Publish: ICIT Securing the Nation

ABOUT CRC PRESS CRC Press, a division of [...]

By |2021-07-21T21:06:53+00:00July 9th, 2021|Front Page Publication, News & Announcements, Uncategorized|Comments Off on Announcement | CRC Press to Publish: ICIT Securing the Nation

Improving the Nation’s Cybersecurity: An ICIT Fellows’ Analysis of President Biden’s Executive Order

President Biden’s Executive Order on Improving the Nation’s Cybersecurity [...]

By |2021-06-07T21:48:06+00:00June 7th, 2021|Frameworks & Guidance, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Improving the Nation’s Cybersecurity: An ICIT Fellows’ Analysis of President Biden’s Executive Order

ICIT Fellow Perspective – The Growing Obsolescence of Passwords

In continued support of our mission to cultivate a [...]

By |2022-03-18T21:18:11+00:00May 5th, 2021|Front Page Publication, Thought Leadership, Uncategorized|Comments Off on ICIT Fellow Perspective – The Growing Obsolescence of Passwords

The Improving Contractor Cybersecurity Act: A Proactive Approach to Securing Federal Networks

The potential impacts of the SolarWinds breach on public [...]

By |2021-04-06T16:30:15+00:00April 2nd, 2021|Front Page Publication, Thought Leadership|Comments Off on The Improving Contractor Cybersecurity Act: A Proactive Approach to Securing Federal Networks

ICIT Fellow Perspective – Integrating Cybersecurity Into the Application Development Lifecycle

In continued support of our mission to cultivate a [...]

By |2021-05-05T22:25:58+00:00March 9th, 2021|Front Page Publication, Thought Leadership|Comments Off on ICIT Fellow Perspective – Integrating Cybersecurity Into the Application Development Lifecycle

The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

As a leader of critical infrastructure cybersecurity research, ICIT [...]

By |2020-11-30T15:16:56+00:00November 12th, 2020|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Physical Security, Technology Assessments, Thought Leadership|Comments Off on The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction
Go to Top