shopify stats

ICIT Research – Executive Function: Leveraging the 2022 President Management Agenda to Increase Efficiency, Improve Trust, and Instill Resiliency

The President’s Management Agenda (PMA) defines Government-wide management priorities [...]

By |2022-09-27T14:16:29+00:00September 22nd, 2022|Cybersecurity Research, ICIT Publications|Comments Off on ICIT Research – Executive Function: Leveraging the 2022 President Management Agenda to Increase Efficiency, Improve Trust, and Instill Resiliency

August 2022 Cyber Legislation and Federal Agency Initiatives Briefing

The monthly “ICIT Cyber Legislation and Federal Agency [...]

By |2022-09-20T19:40:27+00:00September 20th, 2022|Cybersecurity Research, ICIT Publications|Comments Off on August 2022 Cyber Legislation and Federal Agency Initiatives Briefing

Research Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention

ICIT Certified Content: This content has been reviewed by [...]

By |2022-09-06T16:29:46+00:00August 17th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Research Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention

ICIT Fellow Perspective Essay: Avoid Sisyphus – Progressing Beyond the Motion(s) of Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-08-05T15:11:18+00:00August 2nd, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Fellow Perspective Essay: Avoid Sisyphus – Progressing Beyond the Motion(s) of Cybersecurity

June 2022 Cyber Legislation and Federal Agency Initiatives Briefing

The monthly “ICIT Cyber Legislation and Federal Agency [...]

By |2022-09-20T19:29:57+00:00July 5th, 2022|Cybersecurity Research, ICIT Publications|Comments Off on June 2022 Cyber Legislation and Federal Agency Initiatives Briefing

ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

ICIT Certified Content: This content has been reviewed by ICIT [...]

By |2022-06-28T17:07:17+00:00June 28th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:06:56+00:00May 25th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

The State of Cybersecurity in K-12 & Higher Education

By Mack Peterman, Regan McGovern, Jordan Christian, Lexi Rutkowski, [...]

By |2022-06-22T15:53:20+00:00May 16th, 2022|Academic Initiative, Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The State of Cybersecurity in K-12 & Higher Education

ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Securing U.S. critical infrastructures and democratic institutions requires whole-of-government [...]

By |2022-05-17T21:21:42+00:00March 22nd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

At the height of the Cold War, former CIA Chief [...]

By |2022-03-03T21:52:08+00:00March 3rd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

America is defined from its “Melting Pot” shared culture [...]

By |2022-03-15T20:43:44+00:00February 26th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

ICIT’s Bright Minds Q&A Series – Developing Proactive, Responsive, and Ethical Artificial Intelligence Policies

By Joyce Hunter, ICIT Executive Director In [...]

By |2022-02-24T01:39:23+00:00February 24th, 2022|Front Page Publication, ICIT Publications, Latest Posts, Technology Assessments, Thought Leadership, Uncategorized|Comments Off on ICIT’s Bright Minds Q&A Series – Developing Proactive, Responsive, and Ethical Artificial Intelligence Policies

The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:07:03+00:00February 4th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-02-01T00:42:11+00:00January 28th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Uncategorized|Comments Off on ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

Nation state-sponsored threat actors develop, disseminate, and deploy ransomware [...]

By |2022-02-19T16:39:55+00:00December 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT Certified Content: The 2021 Devo SOC Performance Report™ [...]

By |2021-12-16T20:20:00+00:00December 16th, 2021|Cybersecurity Research, ICIT Publications, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreachIn [...]

By |2021-12-06T23:14:59+00:00December 6th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

By Don Maclean, ICIT Fellow and Chief Cyber Security [...]

By |2021-12-07T14:20:38+00:00November 17th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

ICIT Certified Content: 2021 Threat Hunting Report

ICIT Certified Content: This Blackberry publication contains expert insights [...]

By |2021-10-27T16:19:18+00:00October 27th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Threat Hunting Report

Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

In the race to create a Covid-19 vaccine by [...]

By |2021-09-29T19:16:53+00:00September 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

ICIT Virtual Briefing: Secure Automation for Mission Readiness

Federal agencies have increased focus on Intelligent Automation (IA) [...]

By |2021-10-18T17:13:19+00:00September 23rd, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership, Uncategorized|Comments Off on ICIT Virtual Briefing: Secure Automation for Mission Readiness

ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

Zero trust isn’t a new concept, although it’s certainly [...]

By |2021-10-18T17:13:43+00:00September 8th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches [...]

By |2021-09-23T14:12:33+00:00September 7th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

Improving the Nation’s Cybersecurity: An ICIT Fellows’ Analysis of President Biden’s Executive Order

President Biden’s Executive Order on Improving the Nation’s Cybersecurity [...]

By |2021-06-07T21:48:06+00:00June 7th, 2021|Frameworks & Guidance, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Improving the Nation’s Cybersecurity: An ICIT Fellows’ Analysis of President Biden’s Executive Order

ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security

Moving applications and development to the cloud has delivered [...]

By |2021-07-09T12:48:51+00:00May 26th, 2021|Featured, ICIT Publications, Thought Leadership|Comments Off on ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security

Operating in a Compromised Environment – Trusted Recovery from the SolarWinds Breach

In continued support of our mission to cultivate a [...]

By |2021-04-02T22:31:06+00:00January 26th, 2021|ICIT Publications, Thought Leadership|Comments Off on Operating in a Compromised Environment – Trusted Recovery from the SolarWinds Breach

The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

As a leader of critical infrastructure cybersecurity research, ICIT [...]

By |2020-11-30T15:16:56+00:00November 12th, 2020|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Physical Security, Technology Assessments, Thought Leadership|Comments Off on The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

ICIT On-Demand – DevSecOps Public Sector Accelerated ATO Initiative

2nd in the Series of DevSecOps Accelerated ATO As [...]

By |2021-02-22T19:30:24+00:00October 30th, 2020|Frameworks & Guidance, ICIT Publications, Sector Specific, Thought Leadership|Comments Off on ICIT On-Demand – DevSecOps Public Sector Accelerated ATO Initiative

Weapons of Mass Disruption: An Assessment of the Threat Disruptionware Poses to Energy Sector Continuity

Previously, cyberattacks resulting in the targeted disruption of electricity [...]

The Healthcare Research Security Pandemic: Threats to Patient Care, National Security, and the Economy

Today more than ever, millions of lives depend on [...]

The Business Value of a Diverse InfoSec Team: A Discussion on How Gender, Racial, Cognitive, and LGBTQ Diversity Improves Cybersecurity Outcomes

ICIT Diversity in Cybersecurity National security and critical infrastructure [...]

Modernization Requires Leadership: Leading the way to Cloud Security, Zero Trust, and Threat Intelligence

In Modernization Requires Leadership: Leading the way to Cloud [...]

By |2019-10-14T16:29:38+00:00October 11th, 2019|ICIT Publications, Thought Leadership|0 Comments

The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments

In "The Rise of Disruptionware: A Cyber-Physical Threat to [...]

By |2019-09-23T10:58:48+00:00September 22nd, 2019|Cybersecurity Research, ICIT Publications, Physical Security|0 Comments

D.C. Takes On Energy Sector Threats: A Summary of Recent Agency and Congressional Efforts

Cybersecurity researchers often walk a fine line between objectively [...]

By |2019-09-05T12:05:26+00:00September 5th, 2019|Cybersecurity Research, ICIT Publications, Sector Specific|0 Comments

Did China Just Legalize Espionage?: Recent Provisions to Chinese Law Increases Risk to Multinational Organizations Operating in China

Under new provisions to China’s 2017 National Cybersecurity Law [...]

By |2019-03-04T15:10:49+00:00March 3rd, 2019|ICIT Publications, Thought Leadership|0 Comments

Cyber Personnel Are Essential Staff: Federal Recruitment & Retention in Post Shutdown America

One of the most underreported yet greatest national security [...]

By |2019-02-25T15:37:01+00:00February 25th, 2019|ICIT Publications, Sector Specific, Thought Leadership|0 Comments

The USB Threat No One is Talking About: Research on Firmware-Based Attacks Reveals the Urgent Need to Improve Supply Chain Security for all USB-Enabled Devices

This is the second in a series of publications [...]

By |2018-10-22T17:32:05+00:00October 22nd, 2018|ICIT Publications, Technology Assessments|0 Comments

Where the East Meets the West: How Western Internet and Modern Communications Technology Helped Soviet-style Propaganda in Donbass

This document is published as part of ICIT's Contributor [...]

By |2018-12-04T15:54:45+00:00October 17th, 2018|ICIT Publications, Thought Leadership|0 Comments
Go to Top