August 2022 Cyber Legislation and Federal Agency Initiatives Briefing
The monthly “ICIT Cyber Legislation and Federal Agency [...]
The monthly “ICIT Cyber Legislation and Federal Agency [...]
At the height of the Cold War, former CIA Chief [...]
In continued support of our mission to cultivate a [...]
2nd in the Series of DevSecOps Accelerated ATO As [...]
In continued support of our mission to cultivate a [...]
Previously, cyberattacks resulting in the targeted disruption of electricity [...]
In continued support of our mission to cultivate a [...]
ICIT’s monthly "Cyber Legislation & Federal Initiatives Webcast" provides [...]
Today more than ever, millions of lives depend on [...]
Panelists Include: - Dave Summit, CISO, [...]
Panelists Include: - Rachael Martin, Mission [...]
ICIT Solution Insights offers use case based education [...]
In continued support of our mission to cultivate a [...]
ICIT Certified: This content has been reviewed and [...]
In continued support of our mission to cultivate a [...]
On February 10, 2020, the National Counterintelligence and Security [...]
Since the January 2, 2020 drone strikes that killed [...]
ICIT Certified Content: This publication from ICIT Fellow Program [...]
ICIT Diversity in Cybersecurity National security and critical infrastructure [...]
ICIT CERTIFIED: This publication from Federal News Network discusses [...]
In continued support of our mission to cultivate a [...]
December 2019 ICIT Members Will Receive Exclusive Discount [...]
November 2019: ICIT (Institute for Critical Infrastructure Technology) honored [...]
October 2019: The Institute for Critical Infrastructure Technology (ICIT) [...]
Panelists Include: Jonathan Feibus, CISO, Nuclear Regulatory Commission Mark [...]
ICIT Certified Content: As part of our Socialization of [...]
In continued support of our mission to cultivate a [...]
ICIT CERTIFIED: This article from Luther Martin, Distinguished Technologist [...]
In Modernization Requires Leadership: Leading the way to Cloud [...]
ICIT CERTIFIED: This brief from ICIT Fellow Circle Member [...]
In "The Rise of Disruptionware: A Cyber-Physical Threat to [...]
ICIT CERTIFIED: This brief from ICIT Fellow Circle Member [...]
Cybersecurity researchers often walk a fine line between objectively [...]
In this Bright Minds Q&A, we speak with longtime [...]
In this essay, entitled "The Rise of the Cyber [...]
This spring, The Institute for Critical Infrastructure Technology (ICIT) [...]
This draft publication and the abstract below were released [...]
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin [...]
ICIT CERTIFIED: In this paper, the researchers at IOActive, [...]
May 2019: ICIT is thrilled [...]
Most of the 8 million people estimated to fly [...]
April 2019: The Partnership will [...]
Software development that does not incorporate comprehensive security throughout [...]
Sign Up for ICIT Bulletins to receive updates on [...]
On February 21, 2019, Senator Mark Warner (D-VA), the [...]
This publication and the abstract below was published by [...]
ICIT CERTIFIED: This brief from ICIT Fellow Circle Member [...]
Expert Briefings & Roundtable Collaboration on Counterintelligence, DevOps, Supply [...]
March 2019: The Institute for Critical Infrastructure Technology (ICIT), America’s [...]
March 2019: ICIT is thrilled to announce that [...]
March 2019: The Institute for Critical Infrastructure Technology [...]
Under new provisions to China’s 2017 National Cybersecurity Law [...]
This publication and Executive Summary below were published by [...]
One of the most underreported yet greatest national security [...]
ICIT Certified: This talk by ICIT Executive Director Parham [...]
ODNI's National Counterintelligence and Security Center (NCSC) "Know the Risk, [...]
Supply chain security was a pressing problem long before [...]
ICIT Certified: This talk by ICIT Fellow Malcom Harkins, [...]
This framework and the summary below were published by [...]
This is the second in a series of publications [...]
When developing strategies to defend our Nation’s Energy and [...]
This is the first in a series of publications [...]
Despite an incessant onslaught of insider threats, social engineering [...]
This Executive Briefing was curated from ICIT's thought leader [...]
This publication and the abstract below was published by [...]
This publication and the abstract below was published by [...]