ICIT ResearchJun 23, 2017Digital Transformation2017 ICIT Forum: How Threat Intelligence Can Transform your Security Posture
ICIT ResearchJun 23, 2017Emerging Trends2017 ICIT Forum: Endpoint Security - Get Ahead of the Herd with Prevention
ICIT ResearchJun 22, 2017Digital Transformation2017 ICIT Forum: Leveraging Open Source - Phishing Tests - C. Lowe (CISO, USDA)
ICIT ResearchJun 21, 2017Emerging Trends2017 ICIT Forum: Rise of the Machines: IoT/Supply Chain- D. Soulules, R. Cloutier
ICIT ResearchJun 21, 2017Emerging Trends2017 ICIT Forum: The Age of Kinetic Cyber Warfare- G. Garcia, D.Davidson, J. Feibus (DoD/NRC/Army)
ICIT ResearchJun 20, 2017Digital Transformation2017 ICIT Forum: Anatomy of a Frankensteined Network- J. Routh, C. Wlaschin, M. Hermus
ICIT ResearchJun 19, 2017Public Sector2017 ICIT Forum: Addressing Risks to Critical Infrastructure- J. Manfra DHS
ICIT ResearchJun 19, 2017Public Sector2017 ICIT Forum: Top Threats to our National Security (N. Ziering; NSA)
ICIT ResearcherFeb 20, 2017Digital Transformation2017 ICIT Forum: Shifting the Cloud Paradigm - S. Kelley, D. Summit, R. Gupta (EPA, Moffit Cancer)
ICIT ResearchFeb 10, 2017Workforce2017 ICIT Winter Summit: Strategies for Continuity During a Transition
ICIT ResearchFeb 8, 2017Workforce2017 ICIT Winter Summit - Using Cyber Hygiene Programs to Defend Against Insider & External Threats
ICIT ResearchFeb 8, 2017Digital Transformation2017 ICIT Winter Summit - How IaaS can Improve Security and Decrease Costs
ICIT ResearchFeb 7, 2017Public Sector2017 ICIT Winter Summit - Greg Touhill Keynote "Securing the Cyber Frontlines"
ICIT ResearchFeb 7, 2017Public Sector2017 ICIT Winter Summit - Pete Kim (CISO, U.S. Air Force) Keynote