top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable
Each quarter, a selection of ICIT Fellows gather to discuss their perspectives on a timely cybersecurity topic pertinent to critical infrastructure resiliency and national security. The full ICIT Fellows' Insights Roundtable video is featured below. The conversation topic and questions are based on questions solicited from the ICIT community and we hope that the Fellows' Insights prove informative, actionable, and meaningful. As with all ICIT content, the entirety of the disc
Feb 4, 20223 min read


Feb 4, 20220 min read


ICIT Fellow Perspective Essay: The Potential for Blockchain Technology to Improve Cybersecurity
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Jan 28, 20221 min read


Jan 14, 20220 min read


Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition
Nation state-sponsored threat actors develop, disseminate, and deploy ransomware in conjunction with lower sophistication threat actors as a means to disrupt critical infrastructures and covertly influence global great power competitions. While the profits from ransomware attacks appeal to lower-tier attackers and draw them into the threat landscape, nation-state APTs instead benefit from the disruption and chaos that results from both targeted and widespread attacks on the c
Dec 29, 20211 min read


2021 CISO DDoS Handbook
ICIT Certified Content: This Mazebolt whitepaper contains expert insights about DDoS and its threat landscape, solutions, and mitigation in a digitally transforming world for business enterprise continuity and full DDoS security posture. Our researchers have reviewed its contents and recommend it as a trusted source of education. This whitepaper starts with a close look at the reasons why DDoS is moving up the threat chain and the best ways to protect enterprises from DDoS
Dec 27, 20211 min read


ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned
CIT Certified Content: The 2021 Devo SOC Performance Report™ shows that security operations centers — and those who work in them — continue to have a number of challenges to overcome. Based on an independent survey of global cybersecurity professionals, our third annual report examines current trends for those who lead and work in SOCs. While there are some indicators of slight improvement, it’s clear that for too many people, working in the SOC remains painful. The 2020 surv
Dec 16, 20212 min read


ICIT's Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World
By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreach In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their
Dec 6, 20211 min read


Nov 30, 20210 min read


Nov 24, 20210 min read


ICIT’s Bright Minds: The Application of Zero Trust to Legacy Systems & Operational Technologies
By Don Maclean , ICIT Fellow and Chief Cyber Security Technologist, DLT In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to s
Nov 17, 20211 min read


Nov 17, 20210 min read


ICIT Virtual Briefing: Optimizing SOC Operations
Security operations centers (SOC) are the backbone of the cybersecurity industry providing defense, mitigation, and incident response against risks and attacks. However, SOCs are often criticized as ineffective, and one of the most frequently asked questions about SOC performance is “how to measure SOC effectiveness?” While mean time to resolution (MTTR) is the standard measure of effectiveness, this high-level measurement does not address the underlying optimization and perf
Oct 27, 20213 min read


ICIT Certified Content: 2021 Threat Hunting Report
ICIT Certified Content: This Blackberry publication contains expert insights on Security and technology in the mobility and transportation sectors, including an essay from ICIT. Our researchers have reviewed its contents and recommend it as a trusted source of education. For yet another year, OverWatch disrupted a record number of interactive intrusion attempts2 by identifying malicious activity early and stopping adversaries in their tracks. This report shares insights from
Oct 27, 20212 min read


ICIT’s Bright Minds Q&A: Rushing to Automation
By Donald Heckman, Defense Cyber Solutions Leader & Director, Cybersecurity Solutions, Guidehouse In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and tec
Oct 18, 20211 min read


Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security
In the race to create a Covid-19 vaccine by collaborating across the industry, pharmaceutical companies have exposed more threat surfaces than existed before the pandemic. By combining multiple cybersecurity best practices and strategies, pharmaceutical companies stand a better chance of protecting their valuable IP and vaccines. This publication presents are ten ways the pharmaceutical industry needs to protect the Covid-19 vaccine supply chain. By closing the cybersecurity
Sep 29, 20211 min read
ICIT Virtual Briefing: Secure Automation for Mission Readiness
Federal agencies have increased focus on Intelligent Automation (IA) and Robotic Processing Automation (RPA) as part of their modernization journey. Many have achieved impactful results from automating countless manual processes, freeing up time to focus on innovation and mission support. Although mission critical, the acceleration of automation can introduce new security risks and expand the attack landscape. Agencies looking to deploy IA and RPA projects should be aware tha
Sep 23, 20211 min read


Sep 20, 20210 min read
ICIT Virtual Briefing: Getting Started on the Path to Zero Trust
Zero trust isn’t a new concept, although it’s certainly gained popularity recently after numerous high-profile security incidents and the Executive Order on cybersecurity issued by the White House this past May. While there’s no shortage of theoretical and abstract information available on zero trust, actionable recommendations have been hard to come by. The zero trust architecture provides guidance on protecting resources, the general deployment models are theoretical and no
Sep 8, 20211 min read
bottom of page
-500x198.png)
