News
What many Americans consider basic—reliable electricity, clean water, safe roads—was never a given. But the communities I ...
They weren’t weak or broken. They were warriors—friends I trusted with my life. Friends who carried weight with strength and ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global critical infrastructure — demonstrates how the government can protect ...
You are invited to join ICIT for an exclusive virtual briefing on securing America’s Infrastructure Securing America’s Infrastructure Against Foreign Threats with special guest Cong. Gabe Amo, and ...
On May 7, 2025, Nick Andersen, a member of ICIT’s Industry Council and President & COO of Invictus, testified before the U.S. House Judiciary Subcommittee on Courts, International Property, and the ...
ICIT CEO Cory Simpson submitted testimony to the U.S. House Committee on Oversight and Government Reform for a hearing titled “Salt Typhoon: Securing America’s Telecommunications from State-Sponsored ...
Artificial Intelligence (AI) is frequently portrayed as a disruptive force with the potential to revolutionize industries, optimize workflows, and enhance decision-making in ways that were often seen ...
Navigating Uncertainty in Government Cloud Security As federal agencies enter 2025, they face an increasingly volatile cybersecurity landscape, with state-sponsored threat actors—particularly from ...
Join ICIT for this exclusive virtual roundtable convening top leaders in cybersecurity, energy infrastructure, and public policy to discuss strategies for fortifying the nation’s energy sector against ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
The transition to hybrid work models has significantly expanded the security challenges faced by organizations. As employees and third parties access company resources from various remote locations, ...
Third-party governance practices are evolving in response to the changing cybersecurity landscape, particularly in the context of digital identity management. Traditional approaches to third-party ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results