top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with
ICIT On-Demand: DevSecOps: Analyzing Legacy Apps for Agile Development
SPEAKERS: • Kendra Charbonneau – Lead Engineer and Enterprise Agile Transformation Coach, USAF Business Enterprise Systems • Rajive Mathur – Former Chief Information Officer, Social Security Administration • Moderator: Nick Sinai – Senior Advisor, Insight Partners, Harvard Kennedy School, Obama White House (former US Deputy CTO) • Joyce Hunter - Executive Director, ICIT & Former Deputy CIO for Policy and Planning, USDA The transition to Agile development is complex and challe
Mar 1, 20211 min read


The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips...
As a leader of critical infrastructure cybersecurity research, ICIT has warned about supply chain security concerns in the past and we have supported initiatives and frameworks like Deliver Uncompromised. This publication will serve as the first in an on-going series focused on supply chain security. Subsequent publications will vary in content from high-level thought leadership to technical analysis. This ICIT publication will discuss the risk posed to devices that rely on t
Nov 12, 20201 min read


Nov 9, 20200 min read
ICIT On-Demand - Interactive Security Testing, DevSecOps, and NIST SP 800-53 Rev. 5
Watch Video Panelists Include: Dr. Ron Ross, Fellow, NIST & 2019 ICIT Pioneer Tim Anderson, ICIT Contributor & Sr. Security Advisor, AWS Jeff Hsiao, ICIT Contributor & Security Solutions Engineer, Checkmarx Parham Eftekhari, Board Chair, ICIT & Executive Director, The Cybersecurity Collaborative Joyce Hunter, Executive Director, ICIT & Former Deputy CIO for Policy and Planning, USDA The need for increasing levels of software security is becoming even more apparent as organi
Aug 21, 20201 min read


ICIT Fellow Perspective - A Holistic Approach to App Dev. and Digital Security for the Enterprise
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Jul 21, 20202 min read


ICIT On-Demand - Secure Intelligent Automation for Mission Readiness
ICIT Solution Insights offers use case based education on technology products and how they address problems facing our nation’s critical infrastructure sectors. These reports help our community navigate the crowded vendor ecosystem with trusted knowledge from ICIT. Watch Video Panelists Include: John Kuenzli, Retired Deputy Chief of Staff, Army Material Command ( IBM ) Jason Prow, ICIT Contributor & Partner, IBM US Federal, Automation Leader Jon Walden, ICIT Contr ibu tor &
Jun 26, 20202 min read


ICIT Bright Minds: Deconstructing Vendor AI Exaggerations with Pete Slade, ThreatWarrior Founder/CTO
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their knowledge and insights with our community to shed light on sol
Mar 27, 20201 min read


DoD Readiness & Asset Management
ICIT CERTIFIED: This publication from Federal News Network discusses DoD efforts to modernize their systems and ensure the resiliency of national security assets. Defense Department leaders didn’t mince words when they wrote the National Defense Strategy. Restoring readiness is their top priority. Pentagon leadership recognize the increased risks the military faces without this focused effort to prepare the force for current and future combat missions. In this exclusive exec
Dec 12, 20191 min read


ICIT Bright Minds: The Role of SMBs on DIB Cybersecurity With Ernie Magnotti, CISO, Leonardo DRS
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their knowledge and insights with our community to shed light on sol
Nov 19, 20191 min read


Nov 13, 20190 min read


Nov 13, 20190 min read


Executive Briefing Series: Space Command 2.0
ICIT CERTIFIED: This article from Luther Martin, Distinguished Technologist at ICIT Fellow Circle Member Micro Focus Government Solutions, was featured as the Crypto Corner entry in the October 2019 ISSA Journal. The article has been reviewed by ICIT researchers and was deemed a valuable educational document the Institute encourages you to read and share among your community. On August 29, 2019, the US government reactivated its Space Command . The previous Space Command was
Oct 29, 20191 min read


The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and introducing severe risk into OT environments through the use of malware that can degrade or halt manufacturing processes, damage reputations, extort money from victims, or accomplish other targeted outcomes. Disruptionware is an emerging category of malware designed to suspend operatio
Sep 22, 20192 min read


800-171B: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
This draft publication and the abstract below were released by NIST in June 2019. ICIT strongly encourages you to visit the NIST Publication Library to search for additional information security resources which are freely available. Draft NIST Special Publication 800-171B: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of par
Jun 29, 20191 min read


Last Call for SATCOM Security
ICIT CERTIFIED: In this paper, the researchers at IOActive, an ICIT Fellow Circle Member, offer three real-world scenarios involving serious vulnerabilities that affect the aviation, maritime, and military industries. It has been reviewed by ICIT researchers and is certified as an educational document. ICIT encourages stakeholders to read this paper and distribute it widely to share its contents. This research comprehensively details three real-world scenarios involving ser
Jun 12, 20192 min read


Hacking Our Nation's Airports
Most of the 8 million people estimated to fly every day directly or indirectly interact with the technologies running the “typical airport’ experience” – avionics software on planes, air traffic control systems, fuel pumps, baggage handling systems, ticketing systems, security systems, etc. – without considering the resiliency and security of the software or equipment they interact with. However, like most technology, the software and equipment used to run the operations of
May 14, 20191 min read


Software Security is National Security
Software development that does not incorporate comprehensive security throughout the lifecycle of the application jeopardizes national security by increasing the threat landscape surrounding high-value networks and sensitive data. Unfortunately, many of today’s technology manufacturers prioritize speed to market over security, have adopted a ‘deploy now, patch later’ culture, and shift the liability of their vulnerable technology onto consumers through EULAs and SLAs. It is v
Apr 20, 20192 min read


Cybersecurity in Building Automation Systems (BAS)
ICIT CERTIFIED: In this paper, the OT Research Team at Forescout, an ICIT Fellow Program Member, performed an exercise in vulnerability and malware research for devices commonly used in building automation system (BAS). It has been reviewed by ICIT researchers and is certified as an educational document. ICIT encourages stakeholders to read this paper and distribute it widely to share its contents. Vulnerabilities in smart buildings are very dangerous because they open thes
Apr 14, 20192 min read


Executive Briefing Series: CDM and Mobile Security
ICIT CERTIFIED: This brief from ICIT Fellow Circle Member Federal News Network offers viewpoints from USDA, Department of Energy, Booz Allen Hamilton and Mobile Iron Executives discussing mobile security and how DHS Continuous Diagnostics & Mitigation (CDM) program capabilities can secure enterprise mobile environments. It has been reviewed by ICIT researchers and is a valuable educational document the Institute encourages you to read and share among your community. With mob
Mar 24, 20191 min read
bottom of page
-500x198.png)
