ICIT Fellow5 days agoEmerging TrendsThe Dark Nexus: Unraveling the Connection Between Financial and Cybersecurity Crime
ICIT ResearchApr 27ICIT ResearchTesting and Governance Considerations for the Management of Open-Source Software
ICIT ResearchDec 21, 2022Bright MindsBright Minds Q&A Series: Crucial Consideration for Federal Government Cybersecurity Strategies
ICIT ResearchDec 19, 2022Digital TransformationChanging the Perception: Using Digital Transformation to Increase Trust in Government Agencies
ICIT ResearchAug 2, 2022Fellow EssaysICIT Fellow Perspective Essay: Avoid Sisyphus - Progressing Beyond the Motion(s) of Cybersecurity
ICIT ResearchMay 25, 2022Emerging TrendsMay 2022 Fellows' Insights Roundtable: "How Should Legislators & Agency Leaders Deter Cyber Attacks"
ICIT ResearchMay 16, 2022VideoThe State of Cybersecurity in K-12 and Higher Education: Risk Assessment and Analysis
ICIT ResearchMay 5, 2022Emerging TrendsICIT 2022 Spring Briefing | Risk Management 2032: Preparing for a Sustainable Future
ICIT ResearchMay 5, 2022Emerging TrendsICIT 2022 Spring Briefing | Closing Keynote | Jake Wood - CEO and Founder, Team Rubicon
ICIT ResearchMay 5, 2022Emerging TrendsICIT 2022 Spring Briefing: Building Your Plan - How Do We Get There from Here Committee
ICIT ResearchMay 5, 2022Emerging TrendsCongressman Jim Langevin -House of Representatives Cybersecurity Committee
ICIT ResearchMay 5, 2022Emerging TrendsICIT 2022 Spring Briefing: Wins and Losses: 2021 Lessons Learned Defending National Security
ICIT ResearchMay 5, 2022Emerging TrendsICIT 2022 Spring Briefing: Keynote | Nitin Natarajan, Deputy Director, CISA
ICIT ResearchMay 5, 2022Emerging TrendsICIT 2022 Spring Briefing | Devising the Future: Emerging Strategies, Innovations, and Solutions