top of page

Research
Trusted Critical Infrastructure Technology Research from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with

The Center for FCEB Resilience.


The Deferral Trap: Compounding Risk and AI Adoption Governance
The Mythos moment is significant for reasons that extend beyond its immediate cybersecurity implications. It establishes, with unusual clarity, that AI capability has crossed a threshold in the offensive domain — and that the defensive and governance infrastructure available to most institutions has not kept pace. That gap is not a projected risk. It is a present condition.
Apr 143 min read


Entangled Migrations PQC, QKD, and US–PRC Risk Postures for Critical Infrastructure
Examine how U.S. and PRC approaches to post-quantum cryptography (PQC) and quantum key distribution (QKD) reveal divergent risk strategies for protecting critical infrastructure. This ICIT perspective explores why relying solely on PQC may leave Tier-1 systems exposed—and whether a defense-in-depth model is needed for the quantum era.
Mar 203 min read


Why Trust and Data Integrity Are the Cornerstones of AI for the Public Sector | Wecast
The ICIT Strategic Partner Webcast “Why Trust and Data Integrity Are the Cornerstones of AI for the Public Sector” is now available to watch. This timely discussion explores how agencies can operationalize transparency, governance, and secure data practices to deploy AI systems that are resilient, accountable, and mission-ready.
Feb 61 min read


Strengthening the Civilian Backbone of National Security: ICIT’s Center for FCEB Resilience 2025 Impact Report
ICIT’s Center for FCEB Resilience marked a pivotal year advancing civilian cyber resilience through research, convenings, and public-private collaboration. See how government, industry, and partners are strengthening the federal enterprise—and how your organization can help lead the next phase.
Jan 283 min read
Data Centers & AI.


Operating at the Speed of the Adversary
This is the second in a series of articles examining the security implications of AI-driven vulnerability discovery. The first addressed the engineering foundation. This one addresses the operational reality.
This one addresses how organizations must operate from where they actually are, which for most is not a clean, well-architected starting point but rather decades of accumulated technical decisions that were never evaluated through a security engineering lens.
Apr 279 min read


AI Vulnerability Discovery and the Case for Systems Security Engineering
For decades, the approach to building technology has operated on an implicit assumption that security could be addressed after the fact...This created an environment in which building technology that simply worked was sufficient, and the cost of building technology that was engineered to be secure was treated as an unnecessary burden on development timelines and budgets... The capabilities demonstrated by recent advances in artificial intelligence have fundamentally altered t
Apr 169 min read


The Deferral Trap: Compounding Risk and AI Adoption Governance
The Mythos moment is significant for reasons that extend beyond its immediate cybersecurity implications. It establishes, with unusual clarity, that AI capability has crossed a threshold in the offensive domain — and that the defensive and governance infrastructure available to most institutions has not kept pace. That gap is not a projected risk. It is a present condition.
Apr 143 min read


Identity Security: In the Critical Path for Agent Deployment
Create a paper that guides the financial services sector and other sectors to evolve practices toward identity security (and away from identity governance platforms) as an essential component for AI Agent deployment at enterprise scale. Identify alignment with the practical approach used by Wells Fargo.
Apr 102 min read
Defense Critical Infrastructure.


Acquisition Reform Is Materializing, but the Harder Test Still Lies Ahead
Acquisition reform returns as a familiar Washington ritual, yet change is often only seen at the margins. The task at hand has simply been too monumental to effectively revamp the entire system: Reforming how the Pentagon buys alone isn’t enough, any meaningful transformation depends on revitalizing the industrial base, strengthening supply chain security, giving industry the capital and demand certainty to invest, requirements-setting, and sustained workforce development and
Apr 78 min read


Iran and the Expanding Cyber Front: What Government Leaders Need to Know
Explore how Iran’s expanding cyber operations are reshaping national security risk for governments and critical infrastructure. This perspective outlines evolving tactics—from disruptive attacks to long-term espionage—and what leaders must do now to prepare for escalating cyber conflict.
Mar 235 min read


The Three-Legged Drone Stool: Policy, Production, and Protection
Discover why U.S. drone dominance depends on three interconnected pillars—policy, production, and protection. In this SC Media perspective, Brett Freedman explains how strengthening regulatory frameworks, scaling industrial capacity, and advancing counter-drone defenses are essential to maintaining national security and protecting critical infrastructure in the age of drone warfare.
Mar 96 min read


The Drone Gap: Why the U.S. Industrial Base Continues to Fall Behind in a World at War by Drone
As drone warfare reshapes global conflict, the U.S. industrial base is falling behind—exposing tactical gaps, supply risks, and strategic vulnerabilities that demand urgent investment and policy response.
Mar 45 min read
Drones+.


The Three-Legged Drone Stool: Policy, Production, and Protection
Discover why U.S. drone dominance depends on three interconnected pillars—policy, production, and protection. In this SC Media perspective, Brett Freedman explains how strengthening regulatory frameworks, scaling industrial capacity, and advancing counter-drone defenses are essential to maintaining national security and protecting critical infrastructure in the age of drone warfare.
Mar 96 min read


The Drone Gap: Why the U.S. Industrial Base Continues to Fall Behind in a World at War by Drone
As drone warfare reshapes global conflict, the U.S. industrial base is falling behind—exposing tactical gaps, supply risks, and strategic vulnerabilities that demand urgent investment and policy response.
Mar 45 min read


The Electric Tech Stack: Its Importance and How the U.S. can Keep Pace with China
Explore how the U.S. can maintain competitive advantage in advanced technology against China by strengthening the “electric tech stack” that underpins defense, infrastructure, and innovation. This insight from SC Media highlights why semiconductor supply chains, critical materials, industrial policy, and cross-sector collaboration are essential to national security and economic resilience.
Jan 125 min read


Critical Infrastructure Awareness Month: ICIT’s 2026 Vision to Strengthen and Modernize U.S. Critical Infrastructure
ICIT organizes its focus area on critical infrastructure into three interdependent pillars that incorporate four of the sixteen critical infrastructure sectors: Energy & Grid, Water & Wastewater, and Transportation & Telecommunications. In 2026, we will be examining these pillars through the lens of topics like Defense Critical Infrastructure, Cyber Force, Drones, Federal Civilian Executive Branch, and Data Centers & Artificial Intelligence.
Nov 29, 20255 min read
Workforce.


Acquisition Reform Is Materializing, but the Harder Test Still Lies Ahead
Acquisition reform returns as a familiar Washington ritual, yet change is often only seen at the margins. The task at hand has simply been too monumental to effectively revamp the entire system: Reforming how the Pentagon buys alone isn’t enough, any meaningful transformation depends on revitalizing the industrial base, strengthening supply chain security, giving industry the capital and demand certainty to invest, requirements-setting, and sustained workforce development and
Apr 78 min read


ICIT Welcomes Will Markow, Founder & CEO of FourOne Insights as a New ICIT Fellow
ICIT Welcomes Will Markow, Founder & CEO of FourOne Insights as a New ICIT Fellow
Mar 311 min read


Living Between Breakdown and Build: America’s Infrastructure is Being Built in Plain Sight
In this latest SC Media perspective, ICIT CEO Cory Simpson highlights the tension that defines this moment: while global competition, cyber threats, and climate disruptions create a sense of breakdown, the quiet work of building better, more resilient infrastructure is reshaping the foundations of everyday life.
Feb 234 min read


Closing the Cyber Workforce Gap: Why Hands-On Experience Matters
Discover why hands-on experience is essential to closing the cybersecurity workforce gap in this SC Media perspective. Learn how practical training, apprenticeships, and real-world learning pathways help develop the next generation of cyber professionals and strengthen national resilience.
Jan 264 min read
Digital Archive.


Bright Minds Q&A Series: Crucial Consideration for Federal Government Cybersecurity Strategies
By Steve Kapinos, ICIT Fellow & VP of Cognitive Cyber, ManTech In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their
Dec 21, 20221 min read


Changing the Perception: Using Digital Transformation to Increase Trust in Government Agencies
Having a child and early childhood for low-income families Navigating the transition to civilian life Approaching retirement Facing a financial shock Recovering from a disaster This paper explores the critical factors influencing customer trust and provides recommendations and examples for leaders implementing customer experience and digital transformation initiatives. Read the Full Paper
Dec 19, 20221 min read


Dec 16, 20220 min read


Dec 16, 20220 min read
bottom of page
-500x198.png)