Weapons of Mass Disruption: The Threat Disruptionware Poses to Energy Sector Continuity
![Home.png](https://static.wixstatic.com/media/eeb392_19a27be705214304ad83910219ab6598~mv2.png/v1/fill/w_47,h_26,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/eeb392_19a27be705214304ad83910219ab6598~mv2.png)
Digital Library
Trusted Cybersecurity and Technology Research from ICIT Community Experts.
Arm yourself with insights on current trends, innovation and emerging technology for virutally every public and private sector.
![](https://static.wixstatic.com/media/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg)
![Weapons of Mass Disruption: The Threat Disruptionware Poses to Energy Sector Continuity](https://static.wixstatic.com/media/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg)
![ICIT Fellow Perspective - A Holistic Approach to App Dev. and Digital Security for the Enterprise](https://static.wixstatic.com/media/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png)
- Jul 21, 2020
ICIT Fellow Perspective - A Holistic Approach to App Dev. and Digital Security for the Enterprise
![ICIT On-Demand - Secure Intelligent Automation for Mission Readiness](https://static.wixstatic.com/media/adce34_2dd7f80900944458b123dd3b30cbdbd0~mv2.png/v1/fill/w_474,h_163,fp_0.50_0.50,q_95,enc_auto/adce34_2dd7f80900944458b123dd3b30cbdbd0~mv2.png)
- Jun 26, 2020
ICIT On-Demand - Secure Intelligent Automation for Mission Readiness
![](https://static.wixstatic.com/media/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg)
![Secure Intelligent Automation for Accelerating Insight and Enabling Readiness for Warfighters](https://static.wixstatic.com/media/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg)
- Jun 18, 2020
Secure Intelligent Automation for Accelerating Insight and Enabling Readiness for Warfighters
![](https://static.wixstatic.com/media/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg)
![ICIT Bright Minds: Deconstructing Vendor AI Exaggerations with Pete Slade, ThreatWarrior Founder/CTO](https://static.wixstatic.com/media/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg)
- Mar 27, 2020
ICIT Bright Minds: Deconstructing Vendor AI Exaggerations with Pete Slade, ThreatWarrior Founder/CTO
![Accelerating Legacy System Modernization in Government](https://static.wixstatic.com/media/eeb392_0312ea29650b43219e5263770e0e6aef~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_0312ea29650b43219e5263770e0e6aef~mv2.png)
- Jan 29, 2020
Accelerating Legacy System Modernization in Government
![The Road to Mobility: The 2020 Guide to Trends and Technology for Smart Cities and Transportation](https://static.wixstatic.com/media/eeb392_c2b86fbc623d4a19af7f4ec7408fdf6b~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_c2b86fbc623d4a19af7f4ec7408fdf6b~mv2.png)
- Jan 7, 2020
The Road to Mobility: The 2020 Guide to Trends and Technology for Smart Cities and Transportation
- Nov 25, 2019
ICIT On-Demand: Managing Cyber Risk With Cyber Modernization
![Executive Briefing Series: Biometrics and Government Transformation](https://static.wixstatic.com/media/eeb392_75f604190b1a44678da2ac9fdd701e91~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_75f604190b1a44678da2ac9fdd701e91~mv2.png)
- Oct 10, 2019
Executive Briefing Series: Biometrics and Government Transformation
![The Rise of the Cyber Industrial Complex and Expense in Depth](https://static.wixstatic.com/media/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png)
- Jul 8, 2019
The Rise of the Cyber Industrial Complex and Expense in Depth
![Cybersecurity in Building Automation Systems (BAS)](https://static.wixstatic.com/media/adce34_679b79914d9e4ed9994ac9b350661d67~mv2.png/v1/fill/w_474,h_158,fp_0.50_0.50,q_95,enc_auto/adce34_679b79914d9e4ed9994ac9b350661d67~mv2.png)
- Apr 14, 2019
Cybersecurity in Building Automation Systems (BAS)
![Executive Briefing Series: Digital Transformation](https://static.wixstatic.com/media/eeb392_3c9d6e21b96249d6876864d9609157a8~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_3c9d6e21b96249d6876864d9609157a8~mv2.png)
- Feb 27, 2019
Executive Briefing Series: Digital Transformation