top of page

Operating in a Compromised Environment - Trusted Recovery from the SolarWinds Breach

Updated: Feb 12, 2023

In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT asked some of the brightest minds in national security, cybersecurity, and technology to author essays communicating their perspective. Our goal is to share their knowledge and insights with our community to shed light on solutions to the technology, policy, and human challenges facing the cybersecurity community. Our hope is that their words will motivate, educate, and inspire you to take on the challenges facing your organizations.

In this ICIT Fellows’ Perspective essay, Jerry Davis, Founder, Gryphon X, LLC recounts lessons that he learned throughout his extensive career in federal agencies, leverages them to create insights into the SolarWinds breach, and offers guidance on how to operate sensitive networks during a compromised state. In his essay, Mr. Davis explains:

  • Lessons Learned Throughout a Career Securing Federal Networks, Systems, and Applications

  • Insights into the SolarWinds Breach

  • How to Operate in a Compromised Environment

    • How to Reestablish Trust in Critical Networking Components

    • Tactical Procedures

Read the Full Essay

Download PDF • 589KB


bottom of page