top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


Nov 25, 20190 min read


Nov 25, 20190 min read


Nov 25, 20190 min read


Nov 25, 20190 min read


ICIT Bright Minds: The Role of SMBs on DIB Cybersecurity With Ernie Magnotti, CISO, Leonardo DRS
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their knowledge and insights with our community to shed light on sol
Nov 19, 20191 min read


Nov 18, 20190 min read


Nov 18, 20190 min read


Nov 13, 20190 min read


Nov 13, 20190 min read


Nov 13, 20190 min read


Executive Briefing Series: Space Command 2.0
ICIT CERTIFIED: This article from Luther Martin, Distinguished Technologist at ICIT Fellow Circle Member Micro Focus Government Solutions, was featured as the Crypto Corner entry in the October 2019 ISSA Journal. The article has been reviewed by ICIT researchers and was deemed a valuable educational document the Institute encourages you to read and share among your community. On August 29, 2019, the US government reactivated its Space Command . The previous Space Command was
Oct 29, 20191 min read


Modernization Requires Leadership: Leading the way to Cloud Security, Zero Trust, & Threat Intel
In Modernization Requires Leadership: Leading the way to Cloud Security, Zero Trust, and Threat Intelligence , DLT and ICIT experts detail the role of leadership in ensuring the success of three aspects of modernization: the cloud, zero trust, and threat intelligence. As Executive Order 13800 of May 2017 states, we must modernize to keep pace with our adversaries. Cloud computing, zero trust architecture, and effective threat intelligence promise to improve the security of go
Oct 11, 20191 min read


Executive Briefing Series: Biometrics and Government Transformation
ICIT CERTIFIED: This brief from ICIT Fellow Circle Member Federal News Network offers viewpoints from executives of the General Services Administration, the Small Business Administration, U.S. Citizenship and Immigration Services, and CenturyLink discussing how agencies can manage IT complexities in a multi-cloud world. It has been reviewed by ICIT researchers and is a valuable educational document the Institute encourages you to read and share among your community. Frictio
Oct 10, 20192 min read


The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and introducing severe risk into OT environments through the use of malware that can degrade or halt manufacturing processes, damage reputations, extort money from victims, or accomplish other targeted outcomes. Disruptionware is an emerging category of malware designed to suspend operatio
Sep 22, 20192 min read


Executive Briefing Series: Managing IT Complexities in a Multi-cloud World
ICIT CERTIFIED: This brief from ICIT Fellow Circle Member Federal News Network offers viewpoints from executives of the General Services Administration, the Small Business Administration, U.S. Citizenship and Immigration Services, and CenturyLink discussing how agencies can manage IT complexities in a multi-cloud world. It has been reviewed by ICIT researchers and is a valuable educational document the Institute encourages you to read and share among your community. The clo
Sep 21, 20191 min read


D.C. Takes On Energy Sector Threats: A Summary of Recent Agency and Congressional Efforts
Cybersecurity researchers often walk a fine line between objectively presenting the facts surrounding cybersecurity threats without fearmongering to garner the attention necessary to pressure policy makers and decision makers to take action. This is particularly true in the Energy sector, where the exploitation of vulnerabilities can lead to genuine high-risk outcomes such as regional black-outs and potential loss-of-life incidents. While emphasis is rightfully placed by the
Sep 4, 20191 min read


ICIT Bright Minds: Diversity in Cyber with Devon Bryan, CISO, Federal Reserve
In this Bright Minds Q&A, we speak with longtime ICIT partner and Federal Reserve System V.P. and CISO Devon Bryan about his views on diversity in the field of cybersecurity. ICIT and Mr. Bryan have a long history of action in this space, with Mr. Bryan co-founding the International Consortium for Minority Cybersecurity Professionals (ICMCP) and ICIT helping launch ICMCP with a Town Hall in Congress sponsored by Congresswomen Sheila Jackson-Lee (D-TX) and Judy Chu (D-CA) in
Aug 14, 20191 min read
bottom of page
-500x198.png)


