top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


ICIT Research - Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan
Securing U.S. critical infrastructures and democratic institutions requires whole-of-government vigilance, dedicated leadership, and strategic innovation. In many ways, cybersecurity is an asymmetric tower-defense war game where a digital fog of war obfuscates numerous adversaries with unpredictable resources and varying tactics. Organizations begin with the certainty that their systems will be targeted and an accounting of the resources at their disposal to attempt to mitiga
Mar 22, 20222 min read


ICIT Fellow Perspective - The Role of Cybersecurity Leaders as Educators
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Mar 18, 20221 min read


Returning to the Wilderness of Mirrors: Power and Cyberwarfare Could Start a Digital-Age Cold War
At the height of the Cold War, former CIA Chief of Counterintelligence James Jesus Angleton famously borrowed from T.S. Eliot to describe Soviet operations strategy as a "Wilderness of Mirrors" because they were " myriad of stratagems, deceptions, artifices, and all the other devices of disinformation which the Soviet bloc and its coordinated intelligence services use to confuse and split the West … an ever-fluid landscape where fact and illusion merge." This publication aims
Mar 3, 20222 min read


Feb 28, 20220 min read


Shielded by the Melting Pot: How Diversity & Inclusion Improve U.S. National Security and Resilience
America is defined from its “Melting Pot” shared culture forged from diverse backgrounds, ideologies, and people. America's diversity defines its strength and makes it unique in the great-power competition of the global stage. Conflicts in cyberspace and cyber-physical boundaries jeopardize national security and stability and the U.S. is at an asymmetric disadvantage against digital adversaries of all categories of sophistication, from nation-state sponsored advanced persiste
Feb 26, 20222 min read


ICIT’s Bright Minds Q&A Series - Developing Proactive, Responsive, & Ethical Artificial Intelligence
By Joyce Hunter, Executive Director, ICIT In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their knowledge and insigh
Feb 24, 20221 min read


The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable
Each quarter, a selection of ICIT Fellows gather to discuss their perspectives on a timely cybersecurity topic pertinent to critical infrastructure resiliency and national security. The full ICIT Fellows' Insights Roundtable video is featured below. The conversation topic and questions are based on questions solicited from the ICIT community and we hope that the Fellows' Insights prove informative, actionable, and meaningful. As with all ICIT content, the entirety of the disc
Feb 4, 20223 min read


Feb 4, 20220 min read


ICIT Fellow Perspective Essay: The Potential for Blockchain Technology to Improve Cybersecurity
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
Jan 28, 20221 min read


Jan 14, 20220 min read


Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition
Nation state-sponsored threat actors develop, disseminate, and deploy ransomware in conjunction with lower sophistication threat actors as a means to disrupt critical infrastructures and covertly influence global great power competitions. While the profits from ransomware attacks appeal to lower-tier attackers and draw them into the threat landscape, nation-state APTs instead benefit from the disruption and chaos that results from both targeted and widespread attacks on the c
Dec 29, 20211 min read


2021 CISO DDoS Handbook
ICIT Certified Content: This Mazebolt whitepaper contains expert insights about DDoS and its threat landscape, solutions, and mitigation in a digitally transforming world for business enterprise continuity and full DDoS security posture. Our researchers have reviewed its contents and recommend it as a trusted source of education. This whitepaper starts with a close look at the reasons why DDoS is moving up the threat chain and the best ways to protect enterprises from DDoS
Dec 27, 20211 min read


ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned
CIT Certified Content: The 2021 Devo SOC Performance Report™ shows that security operations centers — and those who work in them — continue to have a number of challenges to overcome. Based on an independent survey of global cybersecurity professionals, our third annual report examines current trends for those who lead and work in SOCs. While there are some indicators of slight improvement, it’s clear that for too many people, working in the SOC remains painful. The 2020 surv
Dec 16, 20212 min read


ICIT's Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World
By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreach In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their
Dec 6, 20211 min read


Nov 30, 20210 min read


Nov 24, 20210 min read


ICIT’s Bright Minds: The Application of Zero Trust to Legacy Systems & Operational Technologies
By Don Maclean , ICIT Fellow and Chief Cyber Security Technologist, DLT In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to s
Nov 17, 20211 min read


Nov 17, 20210 min read
bottom of page
-500x198.png)

