Profile

Cover photo
333 followers|1,067,992 views
AboutPostsPhotosVideos

Stream

ICIT

Shared publicly  - 
 
cio, ciso, cso, cto, govcon, federal, tech, technology, events, cyber, security, cybersecurity, InfoSec, event, thoughtleader, thoughtleaders, thoughtleadership, encryption, IoT, ICIT
Overcoming Event Fatigue: ICIT Programs Offer a Platform for True Thought Leader Collaboration. Home \ ICIT Blog \ Latest Posts \ Overcoming Event Fatigue: ICIT Programs Offer a Platform for True Thought Leader Collaboration. by James Scott (Sr. Fellow, ICIT) & Parham Eftekhari (Sr. Fellow, ICIT).
1
Add a comment...

ICIT

Shared publicly  - 
 
2016 ICIT Gala: Presentation of ICIT Pioneer to General (Ret.) Keith Alexander.
Institute for Critical Infrastructure Technology
1
Add a comment...

ICIT

Shared publicly  - 
 
We asked Ann to give her thoughts on the value ICIT brings to Critical Infrastructure cybersecurity.
www.icitech.org
1
Add a comment...

ICIT

Shared publicly  - 
 
We asked Phyllis to give her thoughts on the value ICIT brings to Critical Infrastructure cybersecurity.
www.icitech.org
1
Add a comment...

ICIT

Shared publicly  - 
 
We asked Leo to give his thoughts on the value ICIT brings to Critical Infrastructure cybersecurity.
www.icitech.org
1
Add a comment...

ICIT

Shared publicly  - 
 
As the adversarial threat landscape continues to hyper-evolve, America’s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted. The Mirai IoT botnet has inspired a renaissance in adversarial interest in DDoS botnet innovation based on the lack of fundamental security-by-design in the Internet and in IoT devices, and based on the lack of basic cybersecurity and cyber-hygiene best practices by Internet users.
In this publication, entitled “Rise of the Machines: The Dyn Attack Was Just a Practice Run”, the Institute for Critical Infrastructure Technology provides a comprehensive and detailed analysis of this threat which has forced stakeholders to recognize the lack of security by design and the prevalence of vulnerabilities inherent in the foundational design of IoT devices. Specifically, this report contains:
A concise overview of the basic structure of the Internet, including key players and protocols (ISO OSI, TCP/IP)
The anatomy of a Distributed Denial of Service Attack (DDoS) including details on Constructing Botnets, Conventional vs. IoT Botnets, Launching a DDoS Attack, and DDoS-as-a-Service
An overview of the Mirai Incidents including KrebsonSecurity, OVH ISP, Dyn, Liberia, Finland, the Tump / Clinton Campaigns, WikiLeaks and Russian Banks
The evolution of IoT malware including profiles on Linux.Darlloz, Aidra, QBot/Qakbot, BASHLITE / Lizkebab/Torlus/gafgyt, and Mirai
A discussion on the sectors at greatest risk including the Financial, Healthcare and Energy Sectors
Recommendations and Remediation to combat this threat
As the adversarial threat landscape continues to hyper-evolve, America's treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted. The Mirai IoT botnet has inspired a renaissance in adversarial interest in DDoS botnet ...
1
Add a comment...

ICIT

Shared publicly  - 
 
Dr. Schneck delivers an inspirational keynote address at the 2016 ICIT Gala & Benefit including personal remarks for the evening's honorees and observations on the role of ICIT in securing the Nation's critical infrastructures.
1
Add a comment...

ICIT

Shared publicly  - 
 
As the adversarial threat landscape continues to hyper-evolve, America’s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted. The Mirai IoT botnet has inspired a renaissance in adversarial interest in DDoS botnet innovation based on the lack of fundamental security-by-design in the Internet and in IoT devices, and based on the lack of basic cybersecurity and cyber-hygiene best practices by Internet users.
In this publication, entitled “Rise of the Machines: The Dyn Attack Was Just a Practice Run”, the Institute for Critical Infrastructure Technology provides a comprehensive and detailed analysis of this threat which has forced stakeholders to recognize the lack of security by design and the prevalence of vulnerabilities inherent in the foundational design of IoT devices. Specifically, this report contains:
A concise overview of the basic structure of the Internet, including key players and protocols (ISO OSI, TCP/IP)
The anatomy of a Distributed Denial of Service Attack (DDoS) including details on Constructing Botnets, Conventional vs. IoT Botnets, Launching a DDoS Attack, and DDoS-as-a-Service
An overview of the Mirai Incidents including KrebsonSecurity, OVH ISP, Dyn, Liberia, Finland, the Tump / Clinton Campaigns, WikiLeaks and Russian Banks
The evolution of IoT malware including profiles on Linux.Darlloz, Aidra, QBot/Qakbot, BASHLITE / Lizkebab/Torlus/gafgyt, and Mirai
A discussion on the sectors at greatest risk including the Financial, Healthcare and Energy Sectors
Recommendations and Remediation to combat this threat
1
Add a comment...

ICIT

Shared publicly  - 
 
We asked Dan to give his thoughts on the value ICIT brings to Critical Infrastructure cybersecurity.
www.icitech.org
1
Add a comment...

ICIT

Shared publicly  - 
 
We asked Jerry to give his thoughts on the value ICIT brings to Critical Infrastructure cybersecurity.
www.icitech.org
1
Add a comment...

ICIT

Shared publicly  - 
 
We asked Tony to give his thoughts on the value ICIT brings to Critical Infrastructure cybersecurity. www.icitech.org
1
Add a comment...

ICIT

Shared publicly  - 
 
ICIT Fellow Rob Roy (HPE) and Sr. Fellow James Scott get settled for the evening's dinner and program honoring Federal CIO Tony Scott & General (Ret.) Keith Alexander.
ICIT Fellow Rob Roy (HPE) and Sr. Fellow James Scott get settled for the evening's dinner and program honoring Federal CIO Tony Scott & General (Ret.) Keith Alexander.
1
Add a comment...
Story
Tagline
A tactical, bipartisan forum of Federal Agency executives, legislative community members and industry leaders focused on solutions based strategies to our Nation's critical infrastructure obstacles‏
Introduction
The Institute for Critical Infrastructure Technology acts as a conduit between the private sector, federal agencies and legislative community.  We facilitate a powerful platform of programs and initiatives that support the exchange of ideas and provide a forum for our members to engage in the open, non-political discourse needed to effectively support and protect our country’s critical infrastructures.
Links