top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest
ICIT Certified Content: This content has been reviewed by ICIT and deemed valuable content for the community. We encourage you to study it and socialize it with your networks. This Synack whitepaper contains expert insights about using a multi-pronged approach including dedicated and continuous application security testing. Our researchers have reviewed its contents and recommend it as a trusted source of education. This white paper discusses penetration testing (pentesting
Jun 28, 20221 min read


The Ethics of Healthcare AI
Artificial Intelligence has the potential to reshape critical infrastructure operations and security. In the healthcare sector, it is projected to significantly improve quality of life, provided it is developed with security controls, such as blockchain and security and privacy – principles, tenets, and ethics in mind. Ultimately, AI is not a silver bullet or panacea; it is a tool that we must train the rising generations to better develop, understand, and use. However, like
May 31, 20221 min read


May 2022 Fellows' Insights Roundtable: "How Should Legislators & Agency Leaders Deter Cyber Attacks"
Each quarter, a selection of ICIT Fellows gather to discuss their perspectives on a timely cybersecurity topic pertinent to critical infrastructure resiliency and national security. The full ICIT Fellows' Insights Roundtable video is featured below. The conversation topic and questions are based on questions solicited from the ICIT community and we hope that the Fellows' Insights prove informative, actionable, and meaningful. As with all ICIT content, the entirety of the disc
May 25, 20222 min read


May 24, 20220 min read


The State of Cybersecurity in K-12 & Higher Education
By Mack Peterman, Regan McGovern, Jordan Christian, Lexi Rutkowski, and Saurabh Pethe The Heinz College of Information Systems and Public Policy, Carnegie Mellon University Created as a joint project between the Institute for Critical Infrastructure Technology (ICIT) and students of Carnegie Mellon University’s Master of Science in Information Security Policy and Management program, this whitepaper seeks to provide a high-level overview of the current state of cybersecurity f
May 16, 20221 min read


May 16, 20220 min read


May 5, 20220 min read


May 5, 20220 min read


May 5, 20220 min read


ICIT Fellows Perspective Essay: Concise & Consolidated Language in Vulnerability Management Programs
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
May 4, 20221 min read


ICIT Certified Content: SBOMs Reducing Open Source Risk Throughout the Development of Software
ICIT Certified Content: This content has been reviewed by ICIT and deemed valuable content for the community. We encourage you to study it and socialize it with your networks. The whitepaper explores how generating software bills of materials can improve security throughout the software development lifecycle. It was coauthored by Jim Routh, ICIT Fellow, former CISO and CSO at MassMutual, Aetna and CVSHealth, and current cybersecurity advisor and board member. The Apache Log4
May 4, 20222 min read


ICIT Certified Content: Making Better Cyber Risk Decisions - Architecting the Choices
ICIT Certified Content: This content has been reviewed by ICIT and deemed valuable content for the community. We encourage you to study it and socialize it with your networks. The essay, authored by Malcolm Harkins, ICIT Fellow and Chief Security and Trust Officer, Epiphany Systems, was initially published in the Spring 2022 Issue of United States Cybersecurity Magazine . In the relentless battle to protect their companies, CISOs must fight on two fronts with two very differ
May 4, 20221 min read


Apr 26, 20220 min read


Apr 20, 20220 min read


Mar 28, 20220 min read
bottom of page
-500x198.png)




