Making a Case for Cybersecurity
![Home.png](https://static.wixstatic.com/media/eeb392_19a27be705214304ad83910219ab6598~mv2.png/v1/fill/w_47,h_26,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/eeb392_19a27be705214304ad83910219ab6598~mv2.png)
Digital Library
Trusted Cybersecurity and Technology Research from ICIT Community Experts.
Arm yourself with insights on current trends, innovation and emerging technology for virutally every public and private sector.
![](https://static.wixstatic.com/media/3021df_994f9e06fddf4d0c8778f6bbc369f2a4~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_994f9e06fddf4d0c8778f6bbc369f2a4~mv2.jpg)
![Making a Case for Cybersecurity](https://static.wixstatic.com/media/3021df_994f9e06fddf4d0c8778f6bbc369f2a4~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_994f9e06fddf4d0c8778f6bbc369f2a4~mv2.jpg)
![](https://static.wixstatic.com/media/3021df_dd65b099297c49aa83778f2b465107b0~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_dd65b099297c49aa83778f2b465107b0~mv2.jpg)
![AI DC: Securing America's Future](https://static.wixstatic.com/media/3021df_dd65b099297c49aa83778f2b465107b0~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_dd65b099297c49aa83778f2b465107b0~mv2.jpg)
- Nov 22, 2023
AI DC: Securing America's Future
![](https://static.wixstatic.com/media/3021df_ca1edbc29463440ea4cc86520f260f8f~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_ca1edbc29463440ea4cc86520f260f8f~mv2.jpg)
![The Role of CISO Shaping Trust in the Age of Artificial Intelligence](https://static.wixstatic.com/media/3021df_ca1edbc29463440ea4cc86520f260f8f~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_ca1edbc29463440ea4cc86520f260f8f~mv2.jpg)
- Jul 25, 2023
The Role of CISO Shaping Trust in the Age of Artificial Intelligence
![](https://static.wixstatic.com/media/3021df_53ad1865ec9b4f948f73c253faf8190c~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_53ad1865ec9b4f948f73c253faf8190c~mv2.jpg)
![Unlocking the Future: Digital Identities in an AI World](https://static.wixstatic.com/media/3021df_53ad1865ec9b4f948f73c253faf8190c~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_53ad1865ec9b4f948f73c253faf8190c~mv2.jpg)
- Jun 13, 2023
Unlocking the Future: Digital Identities in an AI World
![](https://static.wixstatic.com/media/3021df_23430083a4d5435da5e051beb9ad69d0~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_23430083a4d5435da5e051beb9ad69d0~mv2.jpg)
![Guardians of the Virtual Frontier: Unleashing the Power of Offensive Cybersecurity Operations](https://static.wixstatic.com/media/3021df_23430083a4d5435da5e051beb9ad69d0~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_23430083a4d5435da5e051beb9ad69d0~mv2.jpg)
- Jun 6, 2023
Guardians of the Virtual Frontier: Unleashing the Power of Offensive Cybersecurity Operations
![](https://static.wixstatic.com/media/3021df_3d1154b1df974b3ca52dbfd7e3b07718~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_3d1154b1df974b3ca52dbfd7e3b07718~mv2.jpg)
![The Dark Nexus: Unraveling the Connection Between Financial and Cybersecurity Crime](https://static.wixstatic.com/media/3021df_3d1154b1df974b3ca52dbfd7e3b07718~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_3d1154b1df974b3ca52dbfd7e3b07718~mv2.jpg)
- May 23, 2023
The Dark Nexus: Unraveling the Connection Between Financial and Cybersecurity Crime
![](https://static.wixstatic.com/media/3021df_abed53ffd08243228469f26b7eacfb16~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_abed53ffd08243228469f26b7eacfb16~mv2.jpg)
![Policy Brief: Framework for Artificial Intelligence](https://static.wixstatic.com/media/3021df_abed53ffd08243228469f26b7eacfb16~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_abed53ffd08243228469f26b7eacfb16~mv2.jpg)
- May 16, 2023
Policy Brief: Framework for Artificial Intelligence
![](https://static.wixstatic.com/media/3021df_8f66d738c5b84f32a5366b7f4da0b129~mv2.jpg/v1/fill/w_250,h_193,al_c,q_30,blur_30,enc_auto/3021df_8f66d738c5b84f32a5366b7f4da0b129~mv2.jpg)
![Testing and Governance Considerations for the Management of Open-Source Software](https://static.wixstatic.com/media/3021df_8f66d738c5b84f32a5366b7f4da0b129~mv2.jpg/v1/fill/w_474,h_366,fp_0.50_0.50,q_90,enc_auto/3021df_8f66d738c5b84f32a5366b7f4da0b129~mv2.jpg)
- Apr 27, 2023
Testing and Governance Considerations for the Management of Open-Source Software
![](https://static.wixstatic.com/media/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg)
![Bright Minds Q&A Series: Crucial Consideration for Federal Government Cybersecurity Strategies](https://static.wixstatic.com/media/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_666d546465314665323341~mv2_d_6000_4000_s_4_2.jpg)
- Dec 21, 2022
Bright Minds Q&A Series: Crucial Consideration for Federal Government Cybersecurity Strategies
![Changing the Perception: Using Digital Transformation to Increase Trust in Government Agencies](https://static.wixstatic.com/media/eeb392_4a3b628cea1f48e4b4335e6b58931f92~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_4a3b628cea1f48e4b4335e6b58931f92~mv2.png)
- Dec 19, 2022
Changing the Perception: Using Digital Transformation to Increase Trust in Government Agencies
![ICIT Fellow Perspective Essay: Avoid Sisyphus - Progressing Beyond the Motion(s) of Cybersecurity](https://static.wixstatic.com/media/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png)
- Aug 2, 2022
ICIT Fellow Perspective Essay: Avoid Sisyphus - Progressing Beyond the Motion(s) of Cybersecurity
![The Ethics of Healthcare AI](https://static.wixstatic.com/media/eeb392_547cff3849bb4a8d983fa6a3f5e9840a~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_547cff3849bb4a8d983fa6a3f5e9840a~mv2.png)
- May 31, 2022
The Ethics of Healthcare AI
![May 2022 Fellows' Insights Roundtable: "How Should Legislators & Agency Leaders Deter Cyber Attacks"](https://static.wixstatic.com/media/eeb392_97cb3fcd3e0a406e99017baf667426e3~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_97cb3fcd3e0a406e99017baf667426e3~mv2.png)
- May 25, 2022
May 2022 Fellows' Insights Roundtable: "How Should Legislators & Agency Leaders Deter Cyber Attacks"
![](https://static.wixstatic.com/media/31d0a93857b149b5ab12ec952dde0516.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/31d0a93857b149b5ab12ec952dde0516.jpg)
![The State of Cybersecurity in K-12 & Higher Education](https://static.wixstatic.com/media/31d0a93857b149b5ab12ec952dde0516.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/31d0a93857b149b5ab12ec952dde0516.jpg)
- May 16, 2022
The State of Cybersecurity in K-12 & Higher Education