ICIT Fellow Perspective - Integrating Cybersecurity Into the Application Development Lifecycle
![Home.png](https://static.wixstatic.com/media/eeb392_19a27be705214304ad83910219ab6598~mv2.png/v1/fill/w_47,h_26,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/eeb392_19a27be705214304ad83910219ab6598~mv2.png)
Digital Library
Trusted Cybersecurity and Technology Research from ICIT Community Experts.
Arm yourself with insights on current trends, innovation and emerging technology for virutally every public and private sector.
![ICIT Fellow Perspective - Integrating Cybersecurity Into the Application Development Lifecycle](https://static.wixstatic.com/media/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png)
- Mar 1, 2021
ICIT On-Demand: DevSecOps: Analyzing Legacy Apps for Agile Development
![](https://i.ytimg.com/vi/EXIDcWvSftM/sddefault.jpg)
![The Art of CyberWarfare](https://i.ytimg.com/vi/EXIDcWvSftM/sddefault.jpg)
- Feb 24, 2021
The Art of CyberWarfare
![](https://static.wixstatic.com/media/11062b_f2b95b9a585c465cb32874fde7df77e8~mv2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/11062b_f2b95b9a585c465cb32874fde7df77e8~mv2.jpg)
![Operating in a Compromised Environment - Trusted Recovery from the SolarWinds Breach](https://static.wixstatic.com/media/11062b_f2b95b9a585c465cb32874fde7df77e8~mv2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/11062b_f2b95b9a585c465cb32874fde7df77e8~mv2.jpg)
- Jan 26, 2021
Operating in a Compromised Environment - Trusted Recovery from the SolarWinds Breach
![](https://static.wixstatic.com/media/57d1fed6beee4982a729978553fb8ae2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/57d1fed6beee4982a729978553fb8ae2.jpg)
![The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips...](https://static.wixstatic.com/media/57d1fed6beee4982a729978553fb8ae2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/57d1fed6beee4982a729978553fb8ae2.jpg)
- Nov 12, 2020
The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips...
![ICIT On-Demand - DevSecOps Public Sector Accelerated ATO Initiative](https://static.wixstatic.com/media/adce34_db28b173170248afb958af47d08ae6dd~mv2.png/v1/fill/w_474,h_237,fp_0.50_0.50,q_95,enc_auto/adce34_db28b173170248afb958af47d08ae6dd~mv2.png)
- Oct 30, 2020
ICIT On-Demand - DevSecOps Public Sector Accelerated ATO Initiative
![](https://static.wixstatic.com/media/nsplsh_54394358425a4c55766963~mv2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_54394358425a4c55766963~mv2.jpg)
![How to Maintain Election Integrity in a Pandemic](https://static.wixstatic.com/media/nsplsh_54394358425a4c55766963~mv2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_54394358425a4c55766963~mv2.jpg)
- Oct 21, 2020
How to Maintain Election Integrity in a Pandemic
![ICIT On-Demand- 2020 Election Resiliency: Integrity vs. Disruption](https://static.wixstatic.com/media/adce34_db031ccbee634edeb09e1a5e38c29e7b~mv2.png/v1/fill/w_474,h_202,fp_0.50_0.50,q_95,enc_auto/adce34_db031ccbee634edeb09e1a5e38c29e7b~mv2.png)
- Sep 23, 2020
ICIT On-Demand- 2020 Election Resiliency: Integrity vs. Disruption
![ICIT Fellow Perspective - Election Integrity: A Non-Partisan, Whole-of-Nation Effort](https://static.wixstatic.com/media/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png)
- Aug 26, 2020
ICIT Fellow Perspective - Election Integrity: A Non-Partisan, Whole-of-Nation Effort
- Aug 21, 2020
ICIT On-Demand - Interactive Security Testing, DevSecOps, and NIST SP 800-53 Rev. 5
![](https://static.wixstatic.com/media/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg)
![Weapons of Mass Disruption: The Threat Disruptionware Poses to Energy Sector Continuity](https://static.wixstatic.com/media/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_794554716b4c6e68735549~mv2_d_5637_3758_s_4_2.jpg)
- Jul 28, 2020
Weapons of Mass Disruption: The Threat Disruptionware Poses to Energy Sector Continuity
![ICIT Fellow Perspective - A Holistic Approach to App Dev. and Digital Security for the Enterprise](https://static.wixstatic.com/media/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png)
- Jul 21, 2020
ICIT Fellow Perspective - A Holistic Approach to App Dev. and Digital Security for the Enterprise
![ICIT On-Demand - Secure Intelligent Automation for Mission Readiness](https://static.wixstatic.com/media/adce34_2dd7f80900944458b123dd3b30cbdbd0~mv2.png/v1/fill/w_474,h_163,fp_0.50_0.50,q_95,enc_auto/adce34_2dd7f80900944458b123dd3b30cbdbd0~mv2.png)
- Jun 26, 2020
ICIT On-Demand - Secure Intelligent Automation for Mission Readiness
![](https://static.wixstatic.com/media/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg)
![Secure Intelligent Automation for Accelerating Insight and Enabling Readiness for Warfighters](https://static.wixstatic.com/media/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_335a659d3cf44f3ab1a34d27e63596ea~mv2.jpg)
- Jun 18, 2020
Secure Intelligent Automation for Accelerating Insight and Enabling Readiness for Warfighters
![ICIT Fellow Perspective - Cybersecurity in the Age of Connected “Things”](https://static.wixstatic.com/media/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png/v1/fill/w_474,h_366,fp_0.50_0.50,q_95,enc_auto/eeb392_a73ed4758d774a1280f3cf3335f5c726~mv2.png)
- May 13, 2020
ICIT Fellow Perspective - Cybersecurity in the Age of Connected “Things”
![](https://static.wixstatic.com/media/nsplsh_0bf42dde8dc6490fa8bd0db4518fb9a2~mv2.jpg/v1/fill/w_250,h_167,al_c,q_30,blur_30,enc_auto/nsplsh_0bf42dde8dc6490fa8bd0db4518fb9a2~mv2.jpg)
![The Healthcare Research Security Pandemic: Threats to Patient Care, National Security & the Economy](https://static.wixstatic.com/media/nsplsh_0bf42dde8dc6490fa8bd0db4518fb9a2~mv2.jpg/v1/fill/w_474,h_316,fp_0.50_0.50,q_90,enc_auto/nsplsh_0bf42dde8dc6490fa8bd0db4518fb9a2~mv2.jpg)
- May 4, 2020
The Healthcare Research Security Pandemic: Threats to Patient Care, National Security & the Economy
- Apr 30, 2020
ICIT On-Demand - The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization