top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management
PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches such as SolarWinds dominating the news, organizations are daunted by the fear that they could be made infamous in the next major breach. Developing a mature and tightly connected security framework that enables the reduction of risk and improves security capabilities is more critical than ever. While 2020 was fraught with tragic outcomes of social and economic proportions, security teams have learned many lessons
Sep 7, 20213 min read


Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against SolarWinds and the Colonial Pipeline. The Key tenets of the Executive Order include: Threat Information Sharing Cyber Incident Reporting Enhancing Software Supply Chain Security Modernizing Federal Government Cybersecurity Establishing a Cyber Safety Review Board Standardizing t
Jun 7, 20212 min read


The Improving Contractor Cybersecurity Act: A Proactive Approach to Securing Federal Networks
The potential impacts of the SolarWinds breach on public and private sector stakeholders have been the subjects of major research publications and media coverage since December 2020. However, SolarWinds was just the most recent in a long line of infamous cybersecurity breaches ranging from OPM to Equifax, all of which resulted from an adversary’s lateral compromise through the vendor supply chain. The Improving Contractor Cybersecurity Act of 2021 proposed by Representative
Apr 2, 20211 min read


The Art of CyberWarfare
The unprecedented worldwide crisis spawned by the recent and continuing healthcare challenges makes leading more challenging than ever. Executives face the stress and consequences of a pandemic on top of the tumult of an unsettled marketplace and civil unrest. The concepts and tools of meta-leadership help those leaders reframe adversity. The secrets to success are communication, coordination, and collaboration. It is an opportunity for building enduring transformational chan
Feb 24, 20211 min read


Building a Holistic Cybersecurity Culture
According to the 2020 Verizon DBIR , (Data Breach Investigations Report) there were 3,950 confirmed breaches in 2020. The onset of the COVID pandemic resulted in a drastic increase in exploitable vulnerabilities, phishing attempts, ransomware campaigns, and remote compromise attempts. Nevertheless, an estimated 40% of organizations did not have a comprehensive cybersecurity strategy that leveraged technical and non-technical controls to secure their networks and assets and pr
Feb 17, 20211 min read


Managing Through Crisis
Crises and disasters are regular occurrences in organizational life, putting leaders into the spotlight and organizations under tremendous pressure to respond appropriately — whether it is to preserve life or salvage reputations. Hearing how three of our public leaders responsible for communications and connectivity, ensuring small business security and sustainability, and developing metrics-driven performance. At the ICIT Fall 2020 briefing, Louis Dorsey, Senior Director for
Feb 17, 20211 min read


Powerful Leaders Empower Others
The challenge for leaders is to deploy influence, often beyond their formal authority, to foster unity of purpose and effort. The secrets to success are communication, coordination, and collaboration.At the ICIT 2020 Virtual Fall briefing: A Secure Roadmap for the Future, Scott Sloan, the Veritas Senior Director of Pre-Sales Engineering, interviewed Colonel Bobby Saxon, Ret. who is the Deputy CIO at the Office of Information Technology Centers for Medicare & Medicaid Service
Feb 17, 20211 min read


Leading through Crises: Communication, Collaboration, Coordination
The unprecedented worldwide crisis spawned by the recent and continuing healthcare challenges makes leading more challenging than ever. Executives face the stress and consequences of a pandemic on top of the tumult of an unsettled marketplace and civil unrest. The concepts and tools of meta-leadership help those leaders reframe adversity. The secrets to success are communication, coordination, and collaboration. It is an opportunity for building enduring transformational chan
Feb 17, 20211 min read


Operating in a Compromised Environment - Trusted Recovery from the SolarWinds Breach
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Jan 26, 20211 min read


The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips...
As a leader of critical infrastructure cybersecurity research, ICIT has warned about supply chain security concerns in the past and we have supported initiatives and frameworks like Deliver Uncompromised. This publication will serve as the first in an on-going series focused on supply chain security. Subsequent publications will vary in content from high-level thought leadership to technical analysis. This ICIT publication will discuss the risk posed to devices that rely on t
Nov 12, 20201 min read


How to Maintain Election Integrity in a Pandemic
This project researches how to maintain election integrity amid new norms such as social distancing. Additionally, since voter turnout is higher for presidential elections, our current health crisis complicates our electoral system. Furthermore, a greater percentage of Americans historically vote in-person on election day. The questions guiding this research study are the following: Has voting in America ever been postponed? Has global voting ever been prevented due to unprec
Oct 21, 20202 min read


Weapons of Mass Disruption: The Threat Disruptionware Poses to Energy Sector Continuity
Previously, cyberattacks resulting in the targeted disruption of electricity to a geographic region were either hypothetical or featured sophisticated malware, such as Black Energy. Now, digital adversaries are adapting their tools, tactics, and procedures to threaten critical energy sector operational technology (OT) with less sophisticated, commercially available malware such as ransomware. In September 2019, ICIT and Forescout published a whitepaper, The Rise of Disruption
Jul 28, 20201 min read


ICIT On-Demand - Secure Intelligent Automation for Mission Readiness
ICIT Solution Insights offers use case based education on technology products and how they address problems facing our nation’s critical infrastructure sectors. These reports help our community navigate the crowded vendor ecosystem with trusted knowledge from ICIT. Watch Video Panelists Include: John Kuenzli, Retired Deputy Chief of Staff, Army Material Command ( IBM ) Jason Prow, ICIT Contributor & Partner, IBM US Federal, Automation Leader Jon Walden, ICIT Contr ibu tor &
Jun 26, 20202 min read


Secure Intelligent Automation for Accelerating Insight and Enabling Readiness for Warfighters
ICIT Certified: This content has been reviewed and certified by ICIT researchers as valuable content for the community. We encourage you to study it and socialize it with your networks. The daily requirements imposed on military activities continue to grow far more rapidly than budget and resource allocations. Mission essential tasks for our Military continue to expand without removing any earlier demands. Our agencies must take advantage of exponential technologies to impr
Jun 18, 20201 min read


ICIT Member Perspective - Protecting America’s Defense Industrial Advantages in Cyberspace
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Jun 1, 20202 min read


The Healthcare Research Security Pandemic: Threats to Patient Care, National Security & the Economy
Today more than ever, millions of lives depend on the availability, accuracy, and integrity of healthcare networks as they treat patients, develop vaccines, and research medical solutions. The COVID-19 global pandemic is shining a spotlight on the critical role that healthcare research plays in national security, creating a unique opportunity to discuss the impact vulnerabilities have on this vital ecosystem. In the months since the outbreak of the virus, Chinese cyberespiona
May 4, 20202 min read


The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization
ICIT Solution Insights offers use case based education on technology products and how they address problems facing our nation’s critical infrastructure sectors. These reports help our community navigate the crowded vendor ecosystem with trusted knowledge from ICIT. Just because we are in the midst of a global pandemic does not mean we get a reprieve from cyber threats. Reports of COVID-19 related incidents show that many adversaries appear emboldened by the ongoing chaos and
Apr 6, 20202 min read


2020 US Cyberspace Solarium Commission Report
ICIT Certified: This content has been reviewed and certified by ICIT researchers as valuable content for the community. We encourage you to study it and socialize it with your networks. The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences." The finished
Mar 13, 20201 min read


NCSC: The National Counterintelligence Strategy of the U.S. 2020-2022
On February 10, 2020, the National Counterintelligence and Security Center (NCSC) unveiled the National Counterintelligence Strategy of the United States of America 2020-2022, outlining a new approach to counterintelligence to address threats that have evolved significantly since the last strategy in 2016. According to the strategy, which was signed by President Trump on January 7, 2020 and is available at www.ncsc.gov , three principal trends characterize today’s counterinte
Feb 10, 20201 min read


The Iran Cyber Panic: How Apathy Got Us Here, and What to Do Now
Since the January 2, 2020 drone strikes that killed Iranian General Qasem Soleimani, cyber and national security experts have worried about retaliatory cyberattacks against US interests. Today, organizations are preparing for the worst, as the potential for a major cyber incident looms large in the minds of government and private sector leaders alike. While current focus is rightfully on Iran, our long-term security posture requires us to take a step back and ask ourselves wh
Jan 30, 20202 min read
bottom of page
-500x198.png)