top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


How We Lead: At the Seams
Explore leadership under pressure in SC Media’s “How We Lead: At the Seams,” where Cory Simpson reflects on the disciplines—presence, humility, empathy, and resilience—that define effective cybersecurity and organizational leadership as we transition into 2026.
Dec 25, 20254 min read


A Primer on the Cybersecurity and Infrastructure Security Agency
The security of critical infrastructure is essential to national security. It is essential that there be a core authority that is responsible for its cybersecurity. The Cybersecurity and Infrastructure Security Agency, or CISA, is an entity essential to supporting national security and critical infrastructure security. CISA provides a level of centralization that is crucial to supporting security at the national level, including supporting critical infrastructure. The core mi
May 9, 20231 min read


ICIT 2023 Spring Briefing: Faster- Strategic Insights on Increasing the Speed to Deployment
In today's rapid-fire world, cybersecurity leaders are constantly being pushed to develop and deploy solutions faster and faster....
May 8, 20231 min read


ICIT 2023 Spring Briefing Modernization | Safer: Modernizing Critical Infrastructure
One of the paramount priorities for cybersecurity leaders is modernizing our Nation's critical infrastructure. Modernization initiatives...
May 8, 20231 min read


ICIT 2023 Spring Briefing:Theresa Payton - Zero Trust, Software Supply Chain, Modernization in DOD
Theresa Payton, First Female White House CIO, CEO Fortalice® Solutions LLC. Author of Manipulated: Inside the Cyberwar to Hijack...
May 8, 20231 min read


ICIT 2023 Spring Briefing: Bigger - Practical Guidance on Scaling Security Programs
Building and scaling cybersecurity programs require managing complexity and significant resource investments. Security leaders facing...
May 8, 20231 min read


ICIT 2023 Spring Briefing: Understanding the Global Threat Landscape with Colonel Candice Frost
Colonel Candice E. Frost explores the threats by China, Russia, Iran, North Korea, and cybercrime in an in depth dive on their activities...
May 8, 20231 min read


ICIT 2023 Spring Briefing: Modernization - Problem Identification & Prioritization
There are three categories of cybersecurity initiatives: scalability and leveraging efficiencies, speed to objectives, and deepening...
May 8, 20231 min read


Materiality Matters
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that...
May 2, 20231 min read


Book Announcement: CRC Press Publishes Securing the Nation’s Critical Infrastructures
ecuring the Nation’s Critical Infrastructures: A Guide for the 2021–2025 Administration is intended to help the United States executive admi
Jan 1, 20234 min read


May 5, 20220 min read


May 5, 20220 min read


ICIT Certified Content: Making Better Cyber Risk Decisions - Architecting the Choices
ICIT Certified Content: This content has been reviewed by ICIT and deemed valuable content for the community. We encourage you to study it and socialize it with your networks. The essay, authored by Malcolm Harkins, ICIT Fellow and Chief Security and Trust Officer, Epiphany Systems, was initially published in the Spring 2022 Issue of United States Cybersecurity Magazine . In the relentless battle to protect their companies, CISOs must fight on two fronts with two very differ
May 4, 20221 min read


Apr 26, 20220 min read


ICIT Research - Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan
Securing U.S. critical infrastructures and democratic institutions requires whole-of-government vigilance, dedicated leadership, and strategic innovation. In many ways, cybersecurity is an asymmetric tower-defense war game where a digital fog of war obfuscates numerous adversaries with unpredictable resources and varying tactics. Organizations begin with the certainty that their systems will be targeted and an accounting of the resources at their disposal to attempt to mitiga
Mar 22, 20222 min read


ICIT Fellow Perspective - The Role of Cybersecurity Leaders as Educators
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Mar 18, 20221 min read
bottom of page
-500x198.png)



