ICIT ResearchSep 30, 2025ICIT ResearchThe Future of Government Data, AI Automation & Mission-Ready Modernization
ICIT ResearchSep 10, 2025ICIT ResearchModernizing American Critical Infrastructure: Why the Need is Urgent, and Where to Begin
Brett FreedmanAug 13, 2025ICIT ResearchAmerica’s blind spot: As drone production surges globally, U.S. counter-drone policy lags far behind
ICIT ResearchAug 11, 2025IN THE NEWSAnn Dunkin and Dr. David Mussington Appointed Co-Chairs of ICIT’s Center for Federal Civilian Executive Branch (FCEB) Resilience
Cory SimpsonAug 4, 2025ICIT ResearchDARPA’s quantum-age playbook: Engineering cyber resilience with formal methods
Dr. David MussingtonJul 30, 2025IN THE NEWSDr. David Mussington Re-Elected to ISC2 Board of Directors
Cory SimpsonJul 28, 2025ICIT ResearchEmbedded risks: Securing America’s infrastructure from foreign-controlled LiDAR
Cory SimpsonJul 23, 2025ICIT ResearchWired for risk: The overlooked cyber threat to America’s military communities
Cory SimpsonJul 11, 2025ICIT ResearchInfrastructure IS the foundation: Modernizing what serves and secures the American people
Cory SimpsonJun 23, 2025ICIT ResearchReauthorize the Cybersecurity Information Sharing Act before it’s too late
Cory SimpsonJun 16, 2025ICIT ResearchConnected and exposed: Building a cyber future America can trust
ICIT ResearchJun 10, 2025ICIT ResearchProtecting Critical Infrastructure Through Prosecution: Appraising Deterrence Under Federal Criminal Law
Cory SimpsonJun 2, 2025ICIT ResearchCyber resilience is the new deterrence: Why Congress must act before the next escalation
ICIT ResearchMay 21, 2025ICIT In The NewsICIT Industry Council Member Nick Andersen Testifies on AI, Cybersecurity, and the China Threat
ICIT ResearchMay 19, 2025ICIT In The NewsICIT CEO Cory Simpson Submits Testimony to Congress on Salt Typhoon and Nation-State Threats to U.S. Critical Infrastructure
Dr. Darren DeathMay 13, 2025ICIT ResearchSecuring AI: Addressing the OWASP Top 10 for Large Language Model Applications
Jim RouthMay 6, 2025ICIT ResearchHow to Build a Compelling Business Case for a Software Security Program