ICIT ResearchMay 8, 2023Public SectorICIT 2023 Spring Briefing:Theresa Payton - Zero Trust, Software Supply Chain, Modernization in DOD
ICIT ResearchMay 8, 2023Public SectorICIT 2023 Spring Briefing: Bigger - Practical Guidance on Scaling Security Programs
ICIT ResearchMay 8, 2023Public SectorICIT 2023 Spring Briefing: Understanding the Global Threat Landscape with Colonel Candice Frost
ICIT ResearchMay 8, 2023Public SectorICIT 2023 Spring Briefing: Modernization - Problem Identification & Prioritization
ICIT ResearchApr 27, 2023ICIT ResearchTesting and Governance Considerations for the Management of Open-Source Software
ICIT ResearchJan 1, 2023Policies & StandardsBook Announcement: CRC Press Publishes Securing the Nation’s Critical Infrastructures
ICIT ResearchDec 21, 2022Bright MindsBright Minds Q&A Series: Crucial Consideration for Federal Government Cybersecurity Strategies
ICIT ResearchDec 19, 2022Digital TransformationChanging the Perception: Using Digital Transformation to Increase Trust in Government Agencies
ICIT ResearchDec 16, 2022Public Sector2022 ICIT Fall Gala and Benefit, ICIT Pioneer Honoree, Jen Easterly
ICIT ResearchDec 16, 2022Public Sector2022 ICIT Fall Gala and Benefit, Impact Honoree, Colonel Candice Frost
ICIT ResearchSep 22, 2022ICIT ResearchLeveraging the 2022 President Management Agenda to Increase Efficiency, Improve Trust & Resilience
ICIT ResearchSep 20, 2022Public SectorAugust 2022 Cyber Legislation and Federal Agency Initiatives Briefing
ICIT ResearchAug 17, 2022ICIT ResearchResearch Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention
ICIT ResearchAug 2, 2022Fellow EssaysICIT Fellow Perspective Essay: Avoid Sisyphus - Progressing Beyond the Motion(s) of Cybersecurity
ICIT ResearchJul 5, 2022Public SectorJune 2022 Cyber Legislation and Federal Agency Initiatives Briefing
ICIT ResearchJun 28, 2022ICIT ResearchICIT Certified Content: Government Agencies Deserve A Better Way To Pentest
ICIT ResearchMay 25, 2022Emerging TrendsMay 2022 Fellows' Insights Roundtable: "How Should Legislators & Agency Leaders Deter Cyber Attacks"