AI DC: Securing America's Future
ICIT Initiative
Public Sector
Tool Framework in Support of FY2025 Priority
Guardians of the Virtual Frontier: Unleashing the Power of Offensive Cybersecurity Operations
ICIT 2023 Spring Briefing: Faster- Strategic Insights on Increasing the Speed to Deployment
ICIT 2023 Spring Briefing Modernization | Safer: Modernizing Critical Infrastructure
ICIT 2023 Spring Briefing:Theresa Payton - Zero Trust, Software Supply Chain, Modernization in DOD
ICIT 2023 Spring Briefing: Bigger - Practical Guidance on Scaling Security Programs
ICIT 2023 Spring Briefing: Understanding the Global Threat Landscape with Colonel Candice Frost
ICIT 2023 Spring Briefing: Modernization - Problem Identification & Prioritization
2022 Cyber Legislation in Review
Book Announcement: CRC Press Publishes Securing the Nation’s Critical Infrastructures
Bright Minds Q&A Series: Crucial Consideration for Federal Government Cybersecurity Strategies
Leveraging the 2022 President Management Agenda to Increase Efficiency, Improve Trust & Resilience
August 2022 Cyber Legislation and Federal Agency Initiatives Briefing
June 2022 Cyber Legislation and Federal Agency Initiatives Briefing
ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest
May 2022 Fellows' Insights Roundtable: "How Should Legislators & Agency Leaders Deter Cyber Attacks"
The State of Cybersecurity in K-12 & Higher Education
ICIT Research - Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan
Returning to the Wilderness of Mirrors: Power and Cyberwarfare Could Start a Digital-Age Cold War
The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable
Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition
ICIT Virtual Briefing: Getting Started on the Path to Zero Trust
Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security
ICIT On-Demand | Zero Trust: Who’s in your network?
The Improving Contractor Cybersecurity Act: A Proactive Approach to Securing Federal Networks
The Art of CyberWarfare
Operating in a Compromised Environment - Trusted Recovery from the SolarWinds Breach