top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


2021 CISO DDoS Handbook
ICIT Certified Content: This Mazebolt whitepaper contains expert insights about DDoS and its threat landscape, solutions, and mitigation in a digitally transforming world for business enterprise continuity and full DDoS security posture. Our researchers have reviewed its contents and recommend it as a trusted source of education. This whitepaper starts with a close look at the reasons why DDoS is moving up the threat chain and the best ways to protect enterprises from DDoS
Dec 27, 20211 min read


ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned
CIT Certified Content: The 2021 Devo SOC Performance Report™ shows that security operations centers — and those who work in them — continue to have a number of challenges to overcome. Based on an independent survey of global cybersecurity professionals, our third annual report examines current trends for those who lead and work in SOCs. While there are some indicators of slight improvement, it’s clear that for too many people, working in the SOC remains painful. The 2020 surv
Dec 16, 20212 min read


ICIT's Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World
By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreach In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their
Dec 6, 20211 min read


Nov 30, 20210 min read


Nov 24, 20210 min read


ICIT’s Bright Minds: The Application of Zero Trust to Legacy Systems & Operational Technologies
By Don Maclean , ICIT Fellow and Chief Cyber Security Technologist, DLT In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to s
Nov 17, 20211 min read


Nov 17, 20210 min read


ICIT Virtual Briefing: Optimizing SOC Operations
Security operations centers (SOC) are the backbone of the cybersecurity industry providing defense, mitigation, and incident response against risks and attacks. However, SOCs are often criticized as ineffective, and one of the most frequently asked questions about SOC performance is “how to measure SOC effectiveness?” While mean time to resolution (MTTR) is the standard measure of effectiveness, this high-level measurement does not address the underlying optimization and perf
Oct 27, 20213 min read


ICIT Certified Content: 2021 Threat Hunting Report
ICIT Certified Content: This Blackberry publication contains expert insights on Security and technology in the mobility and transportation sectors, including an essay from ICIT. Our researchers have reviewed its contents and recommend it as a trusted source of education. For yet another year, OverWatch disrupted a record number of interactive intrusion attempts2 by identifying malicious activity early and stopping adversaries in their tracks. This report shares insights from
Oct 27, 20212 min read


ICIT’s Bright Minds Q&A: Rushing to Automation
By Donald Heckman, Defense Cyber Solutions Leader & Director, Cybersecurity Solutions, Guidehouse In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and tec
Oct 18, 20211 min read


Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security
In the race to create a Covid-19 vaccine by collaborating across the industry, pharmaceutical companies have exposed more threat surfaces than existed before the pandemic. By combining multiple cybersecurity best practices and strategies, pharmaceutical companies stand a better chance of protecting their valuable IP and vaccines. This publication presents are ten ways the pharmaceutical industry needs to protect the Covid-19 vaccine supply chain. By closing the cybersecurity
Sep 29, 20211 min read
ICIT Virtual Briefing: Secure Automation for Mission Readiness
Federal agencies have increased focus on Intelligent Automation (IA) and Robotic Processing Automation (RPA) as part of their modernization journey. Many have achieved impactful results from automating countless manual processes, freeing up time to focus on innovation and mission support. Although mission critical, the acceleration of automation can introduce new security risks and expand the attack landscape. Agencies looking to deploy IA and RPA projects should be aware tha
Sep 23, 20211 min read


Sep 20, 20210 min read
ICIT Virtual Briefing: Getting Started on the Path to Zero Trust
Zero trust isn’t a new concept, although it’s certainly gained popularity recently after numerous high-profile security incidents and the Executive Order on cybersecurity issued by the White House this past May. While there’s no shortage of theoretical and abstract information available on zero trust, actionable recommendations have been hard to come by. The zero trust architecture provides guidance on protecting resources, the general deployment models are theoretical and no
Sep 8, 20211 min read


The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management
PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches such as SolarWinds dominating the news, organizations are daunted by the fear that they could be made infamous in the next major breach. Developing a mature and tightly connected security framework that enables the reduction of risk and improves security capabilities is more critical than ever. While 2020 was fraught with tragic outcomes of social and economic proportions, security teams have learned many lessons
Sep 7, 20213 min read


Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against SolarWinds and the Colonial Pipeline. The Key tenets of the Executive Order include: Threat Information Sharing Cyber Incident Reporting Enhancing Software Supply Chain Security Modernizing Federal Government Cybersecurity Establishing a Cyber Safety Review Board Standardizing t
Jun 7, 20212 min read
ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security
Moving applications and development to the cloud has delivered both operational and security benefits at scale. However, as organizations begin to automate their infrastructure deployments and configurations using Infrastructure as Code (IaC), a new attack vector has been introduced. In addition, the move to cloud-native architectures increases the use of APIs connecting client applications to cloud hosted, microservices based solutions, introducing another new entry point f
May 26, 20211 min read


ICIT Fellow Perspective - The Growing Obsolescence of Passwords
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
May 5, 20212 min read


Apr 29, 20210 min read
bottom of page
-500x198.png)
