News

The United States is under relentless cyber assault. This is not a distant or hypothetical threat—it’s a silent, ongoing ...
ICIT CEO Cory Simpson submitted testimony to the U.S. House Committee on Oversight and Government Reform for a hearing titled ...
Nick Andersen, a member of ICIT’s Industry Council and President & COO of Invictus, testified before the U.S. House Judiciary ...
You are invited to join ICIT for an exclusive virtual briefing on securing America’s Infrastructure Securing America’s Infrastructure Against Foreign Threats with special guest Cong. Gabe Amo, and ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and ...
Theresa Payton, First Female White House CIO, CEO Fortalice® Solutions LLC. Author of Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth Modernization efforts are thrilling, ...
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against ...
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin from Micro Focus Government Solutions (an ICIT Fellow Program Member) discusses how governments that do not enforce cybercrime laws may in ...
Building and scaling cybersecurity programs require managing complexity and significant resource investments. Security leaders facing challenges such as complex tech stacks, diverse needs, and rapidly ...