Security

ICIT Analysis: The Wound Collectors – Profiling the Self Radicalized Lone-Wolf Terrorist

Acts of domestic terrorism in the West are escalating at an alarming rate. Lone wolf attacks and attackers have sparked public, political and law enforcement curiosity due to the, seemingly, random and independent action of a self-radicalized extremist with modest or no ties directly to the group in which they proclaim the action to be .. read more

ICIT Brief: Combatting the Ransomware Blitzkrieg with Endpoint Security

Ransomware, the weaponization of encryption, has struck fear and confusion into the hearts of PC users and critical infrastructure communities alike. While it is impossible for organizations to prevent malware from infecting their networks, those who deploy a multi-layered security strategy and teach proper cybersecurity hygiene to their employees have a strong chance of defending against these .. read more

ICIT Analysis: FDA Guidance on Medical Device Cyber Security

This Institute for Critical Infrastructure Technology blog post, entitled “Assessing the FDA’s Cybersecurity Guidelines for Medical Device Manufacturers: Why Subtle “Suggestions” May Not Be Enough” is an objective analysis of the recent Food and Drug Administration (FDA) “Draft Guidance for Industry and Food and Drug Administration Staff.” The guidance advises medical device manufacturers to address .. read more

ICIT Congressional Brief: Car Hacking, IoT & Smart City Security Demonstration & Reception

ICIT, sponsored by Congresswoman Sheila Jackson Lee (TX) and in collaboration with ICIT Fellow IOActive, will hold an event at the U.S. House of Representatives to address the growing threat of remote attacks against moving vehicles and the privacy of consumer data captured by automotive systems, in addition to Smartcity security and the general need .. read more

ICIT Brief: OPM Demonstrates that Antiquated Security Practices Harm National Security

The Institute for Critical Infrastructure Technology has published its official analysis of the Office of Personnel Management breach, Handing Over the Keys to the Castle: OPM Demonstrates that Antiquated Security Practices Harm National Security.  This research brief provides insights on several of the most important aspects of the breach, some of which are not being .. read more

Securing Federal Data Post OPM: Lunch & Learn Summary + Slides

                This week the Institute for Critical Infrastructure Technology held a Lunch and Learn called “Securing Data for Today’s Federal Agency” which focused on the increasingly daunting task of protecting federal data in an age of information sharing and increased threats both inside and outside an agency.  An .. read more

National Health Sector Fly-in @ United States Senate

  Speakers Include –   Wesley Snell, Director CSIRC, HHS –  Suzanne Schwartz, Director Emergency Preparedness/Operations & Medical Countermeasures, FDA –  Steve Curren, Director (Acting), Division of Resilience and Infrastructure Coordination, HHS –  Julie Chua, Information Security Specialist, ONC –  Deborah Kobza, Executive Director, NH-ISAC –  Dan Waddell, Managing Director, National Capital Region, (ISC)2 – .. read more

DHS, ICIT and Federal Agency Leaders Collaborate on ISAOs

              On Thursday April 30th, the Institute for Critical Infrastructure Technology (ICIT) hosted its monthly Fellow Meeting with featured thought leader Michael Echols, Director of Special Initiatives, Critical Infrastructure and Key Resources Cyber Operations Management (CIKR-COM) at the Department of Homeland Security (DHS). Mr. Echols led an interactive discussion with .. read more

ICIT Briefs Congress on HR691 Telehealth Modernization Act of 2015

ICIT briefed members of the Rural Health Caucus on HR691  –  Telehealth Modernization Act of 2015, where Fellows provided expertise on rural health, telemedicine, and privacy issues surrounding telehealth initiatives.  ICIT Fellows advised for strong security and access management, interoperability between EHRs, patient access to data, and the securing of data pathways themselves. Click here .. read more

ICIT Fellows Brief Congressional and Senate Members on H.R.3696 Cybersecurity and Critical Infrastructure Protection Act of 2014

Week of March 2, 2015:  ICIT presented to members of the Congressional Cybersecurity Caucus and a member of Senate on H.R. 3696: Cybersecurity and Critical Infrastructure Protection Act, in order to discuss certain aspects of the bill which it believes will be included in 2015 legislation. These meetings gleaned important findings and requests for additional briefings .. read more

Department of Energy CIO (acting) Shares Defense in Depth Strategy at ICIT Fellow Meeting

  March 4, 2015:  Last week, the Institute for Critical Infrastructure Technology (ICIT) hosted their monthly Fellow Meeting. The featured thought leader was Donald Adcock, Chief Information Officer (Acting) for the Department of Energy. In the discussion, Mr. Adcock called for organizations to add “breadth” to their “Defense in Depth” strategies as a means to .. read more

On March 2nd, 2015, posted in: Latest Posts by Tags: , , , , , ,

HP, WatchDox, Covenant Announced as ICIT Fellows

February 10, 2015 –   The Institute for Critical Infrastructure Technology (ICIT) announces the addition of HP, Watchdox, and Covenant Security Solutions as ICIT Fellows, organizations who bring highly qualified experts, technologies and solutions to support the niche advisory ICIT provides the policy community in the fields of critical infrastructure technology and cyber security. “With .. read more