top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


May 5, 20220 min read


May 5, 20220 min read


ICIT Fellows Perspective Essay: Concise & Consolidated Language in Vulnerability Management Programs
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
May 4, 20221 min read


ICIT Certified Content: SBOMs Reducing Open Source Risk Throughout the Development of Software
ICIT Certified Content: This content has been reviewed by ICIT and deemed valuable content for the community. We encourage you to study it and socialize it with your networks. The whitepaper explores how generating software bills of materials can improve security throughout the software development lifecycle. It was coauthored by Jim Routh, ICIT Fellow, former CISO and CSO at MassMutual, Aetna and CVSHealth, and current cybersecurity advisor and board member. The Apache Log4
May 4, 20222 min read


ICIT Certified Content: Making Better Cyber Risk Decisions - Architecting the Choices
ICIT Certified Content: This content has been reviewed by ICIT and deemed valuable content for the community. We encourage you to study it and socialize it with your networks. The essay, authored by Malcolm Harkins, ICIT Fellow and Chief Security and Trust Officer, Epiphany Systems, was initially published in the Spring 2022 Issue of United States Cybersecurity Magazine . In the relentless battle to protect their companies, CISOs must fight on two fronts with two very differ
May 4, 20221 min read


Apr 26, 20220 min read


Apr 20, 20220 min read


Mar 28, 20220 min read


ICIT Research - Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan
Securing U.S. critical infrastructures and democratic institutions requires whole-of-government vigilance, dedicated leadership, and strategic innovation. In many ways, cybersecurity is an asymmetric tower-defense war game where a digital fog of war obfuscates numerous adversaries with unpredictable resources and varying tactics. Organizations begin with the certainty that their systems will be targeted and an accounting of the resources at their disposal to attempt to mitiga
Mar 22, 20222 min read


ICIT Fellow Perspective - The Role of Cybersecurity Leaders as Educators
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Mar 18, 20221 min read


Returning to the Wilderness of Mirrors: Power and Cyberwarfare Could Start a Digital-Age Cold War
At the height of the Cold War, former CIA Chief of Counterintelligence James Jesus Angleton famously borrowed from T.S. Eliot to describe Soviet operations strategy as a "Wilderness of Mirrors" because they were " myriad of stratagems, deceptions, artifices, and all the other devices of disinformation which the Soviet bloc and its coordinated intelligence services use to confuse and split the West … an ever-fluid landscape where fact and illusion merge." This publication aims
Mar 3, 20222 min read


Feb 28, 20220 min read


Shielded by the Melting Pot: How Diversity & Inclusion Improve U.S. National Security and Resilience
America is defined from its “Melting Pot” shared culture forged from diverse backgrounds, ideologies, and people. America's diversity defines its strength and makes it unique in the great-power competition of the global stage. Conflicts in cyberspace and cyber-physical boundaries jeopardize national security and stability and the U.S. is at an asymmetric disadvantage against digital adversaries of all categories of sophistication, from nation-state sponsored advanced persiste
Feb 26, 20222 min read


ICIT’s Bright Minds Q&A Series - Developing Proactive, Responsive, & Ethical Artificial Intelligence
By Joyce Hunter, Executive Director, ICIT In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their knowledge and insigh
Feb 24, 20221 min read
bottom of page
-500x198.png)





