top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


ICIT Virtual Briefing: Optimizing SOC Operations
Security operations centers (SOC) are the backbone of the cybersecurity industry providing defense, mitigation, and incident response against risks and attacks. However, SOCs are often criticized as ineffective, and one of the most frequently asked questions about SOC performance is “how to measure SOC effectiveness?” While mean time to resolution (MTTR) is the standard measure of effectiveness, this high-level measurement does not address the underlying optimization and perf
Oct 27, 20213 min read


ICIT Certified Content: 2021 Threat Hunting Report
ICIT Certified Content: This Blackberry publication contains expert insights on Security and technology in the mobility and transportation sectors, including an essay from ICIT. Our researchers have reviewed its contents and recommend it as a trusted source of education. For yet another year, OverWatch disrupted a record number of interactive intrusion attempts2 by identifying malicious activity early and stopping adversaries in their tracks. This report shares insights from
Oct 27, 20212 min read


ICIT’s Bright Minds Q&A: Rushing to Automation
By Donald Heckman, Defense Cyber Solutions Leader & Director, Cybersecurity Solutions, Guidehouse In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and tec
Oct 18, 20211 min read


Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security
In the race to create a Covid-19 vaccine by collaborating across the industry, pharmaceutical companies have exposed more threat surfaces than existed before the pandemic. By combining multiple cybersecurity best practices and strategies, pharmaceutical companies stand a better chance of protecting their valuable IP and vaccines. This publication presents are ten ways the pharmaceutical industry needs to protect the Covid-19 vaccine supply chain. By closing the cybersecurity
Sep 29, 20211 min read
ICIT Virtual Briefing: Secure Automation for Mission Readiness
Federal agencies have increased focus on Intelligent Automation (IA) and Robotic Processing Automation (RPA) as part of their modernization journey. Many have achieved impactful results from automating countless manual processes, freeing up time to focus on innovation and mission support. Although mission critical, the acceleration of automation can introduce new security risks and expand the attack landscape. Agencies looking to deploy IA and RPA projects should be aware tha
Sep 23, 20211 min read


Sep 20, 20210 min read
ICIT Virtual Briefing: Getting Started on the Path to Zero Trust
Zero trust isn’t a new concept, although it’s certainly gained popularity recently after numerous high-profile security incidents and the Executive Order on cybersecurity issued by the White House this past May. While there’s no shortage of theoretical and abstract information available on zero trust, actionable recommendations have been hard to come by. The zero trust architecture provides guidance on protecting resources, the general deployment models are theoretical and no
Sep 8, 20211 min read


The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management
PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches such as SolarWinds dominating the news, organizations are daunted by the fear that they could be made infamous in the next major breach. Developing a mature and tightly connected security framework that enables the reduction of risk and improves security capabilities is more critical than ever. While 2020 was fraught with tragic outcomes of social and economic proportions, security teams have learned many lessons
Sep 7, 20213 min read


Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against SolarWinds and the Colonial Pipeline. The Key tenets of the Executive Order include: Threat Information Sharing Cyber Incident Reporting Enhancing Software Supply Chain Security Modernizing Federal Government Cybersecurity Establishing a Cyber Safety Review Board Standardizing t
Jun 7, 20212 min read
ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security
Moving applications and development to the cloud has delivered both operational and security benefits at scale. However, as organizations begin to automate their infrastructure deployments and configurations using Infrastructure as Code (IaC), a new attack vector has been introduced. In addition, the move to cloud-native architectures increases the use of APIs connecting client applications to cloud hosted, microservices based solutions, introducing another new entry point f
May 26, 20211 min read


ICIT Fellow Perspective - The Growing Obsolescence of Passwords
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solut
May 5, 20212 min read


Apr 29, 20210 min read


Apr 29, 20210 min read


Apr 29, 20210 min read


Apr 29, 20210 min read


ICIT On-Demand | Zero Trust: Who’s in your network?
In 2019, securely operating a distributed workforce was an ideal “wouldn’t it be great if,” and in 2020, this became a requirement. In the wake of the COVID-19 pandemic, cybersecurity teams found themselves frantically working to continue business operations in a suddenly perimeter-less environment. And that trend is likely here to stay, which means that cybersecurity and business leaders need to understand how the zero trust principles changed in the remote working world? An
Apr 23, 20211 min read
bottom of page
-500x198.png)



