MISSION CRITICAL
Home
About
  • Leaders
  • Partners
  • Foundational Principles
  • Contact
Education Initiatives
  • SANS Black History Month
Digital Library
Collaborate
MISSION CRITICAL
Home
About
  • Leaders
  • Partners
  • Foundational Principles
  • Contact
Education Initiatives
  • SANS Black History Month
Digital Library
Collaborate
More
  • Home
  • About
    • Leaders
    • Partners
    • Foundational Principles
    • Contact
  • Education Initiatives
    • SANS Black History Month
  • Digital Library
  • Collaborate

  • Home
  • About
    • Leaders
    • Partners
    • Foundational Principles
    • Contact
  • Education Initiatives
    • SANS Black History Month
  • Digital Library
  • Collaborate

Digital Library

Publications

Dr. David Mussington Critical Insights The Silent Storm: Why Our Cybersecurity Strategy Must Evolve

The Silent Storm: Why Our Cybersecurity Strategy Must Evolve

Cyber activities conducted by or at the direction of the People's Republic of China have long been the topic of public comment by federal officials. Bemoaning the theft of intellectual property and sensitive data is commonplace in Washington among those concerned or responsible for protecting critical infrastructures and sensitive data. So, what is the renewed urgency about? What has changed since the early 2010s to introduce a qualitatively different dimension to cyber defense and international stability discussions? Improvements in analytics and detection techniques have allowed for the drawing of refined and alarming conclusions from years of research.


In this Critical Insights publication, Dr. David Mussington details how Volt Typhoon and Salt Typhoon are not just “hacking” – they are pre‑positioning inside civilian lifelines to enable coercion of democratic societies in a crisis, which demands treating their activity as battlespace preparation across utilities, telecom, lawful intercept, and cloud control channels rather than garden‑variety espionage. 

Read More

Manure as the Biomass of Choice: Advancing the Bioeconomy Through Data, Equity, and Innovation

Manure, an abundant, underutilized agricultural byproduct, offers promise as a foundational biomass feedstock for the North American bioeconomy. Compared to traditional sources like soybeans or canola, manure is more economically viable, environmentally sustainable, and operationally scalable. By centering data infrastructure, circular economy models, and inclusive innovation, this approach aligns with the mission of the North American Bioeconomy Data Alliance (NABDA) and  supports national goals in renewable energy, soil health, water quality,  and rural equity.   

Read More

Critical Insights

Beyond the Playbook: Protecting Game Day from Global Threats

Beyond the Playbook: Protecting Game Day from Global Threats

Beyond the Playbook: Protecting Game Day from Global Threats

Chief Cathy Lanier – National  Football League (NFL) Chief Security Officer (CSO) - shares information  security insights, lessons, and priorities informed by her decades of  experience securing the NFL and Washington DC. Mission Critical  Executive Director Joyce Hunter and Chief Lanier discuss emerging topics  including drones, security governance, diversity, equity, and inclusion  efforts, and strategies for proactively effecting change.  

Improving Critical Infrastructure Prioritization

Beyond the Playbook: Protecting Game Day from Global Threats

Beyond the Playbook: Protecting Game Day from Global Threats

Dr. David Mussington – Cybersecurity and Infrastructure Security Agency  (CISA) Executive Assistant Director for Infrastructure Security (ISD) -  explains why policymakers, the private sector, and the public should  prioritize critical infrastructure security and resilience.   

Mind and Machine: Cybersecurity Through the Human Lens

Beyond the Playbook: Protecting Game Day from Global Threats

Mind and Machine: Cybersecurity Through the Human Lens

Michael Clark delves into the evolving intersection of technology and human factors in cybersecurity. Clark also discusses employees’ critical role in safeguarding data, the necessity of fostering a culture of awareness and adaptability, and the importance of human-centric strategies in an increasingly digitized world.

Recognizing the Criticality of Infrastructure

Anticipating the Impact of the Chevron Repeal on Cybersecurity Governance

Mind and Machine: Cybersecurity Through the Human Lens

Mark Montgomery emphasizes the importance of understanding and  prioritizing US Critical Infrastructure.

Anticipating the Impact of the Chevron Repeal on Cybersecurity Governance

Anticipating the Impact of the Chevron Repeal on Cybersecurity Governance

Anticipating the Impact of the Chevron Repeal on Cybersecurity Governance

Robert Metzger explains the Chevron Deference and offers realistic  analysis of current and future impacts that the recent Supreme Court  decision to repeal the Chevron Deference will have on cybersecurity  governance.

How Continuous ATO (cATO) Enhances Security

Anticipating the Impact of the Chevron Repeal on Cybersecurity Governance

Anticipating the Impact of the Chevron Repeal on Cybersecurity Governance

Don Maclean emphasizes how adopting a Continuous Authority to Operate  (cATO) model can helps an organization improve security, maximize  resource allocation, and proactively develop resiliency. 

Can AI Detect and Mitigate Insider Threats?

Harnessing Adversarial Tactics for Predictive Prevention

Harnessing Adversarial Tactics for Predictive Prevention

Pete Slade, ThreatWarrior CTO & Founder, provides definitions,  examples, and profiles for insider threats categories. Afterward, Pete  advises on the most effective non-technical (governance, culture, etc)  and technical (zero trust, UBA, machine learning, etc) strategies  organizations can adopt to deter and mitigate each category of insider  threat.  

Harnessing Adversarial Tactics for Predictive Prevention

Harnessing Adversarial Tactics for Predictive Prevention

Harnessing Adversarial Tactics for Predictive Prevention

Itzik Kotler, SafeBreach CTO & Co-Founder, explains how adversarial  simulation and preventative prediction can help critical infrastructure  stakeholders improve their security postures, invest in proactive  solutions, and thwart adversarial attack campaigns. 

You Should Care About Food and Agriculture Cybersecurity

Harnessing Adversarial Tactics for Predictive Prevention

You Should Care About Food and Agriculture Cybersecurity

Joyce Hunter - Former USDA Acting CIO and Deputy CIO - explains the  importance of the security and resilience of the Food and Agriculture  sector and discusses how to attract and retain rising cyber talent. 

The Convergence of Critical Infrastructure and AI

The Convergence of Critical Infrastructure and AI

You Should Care About Food and Agriculture Cybersecurity

Malcolm Harkins - Chief Security and Trust Officer, HiddenLayer - discusses the nuances, opportunities, and risks associated with the  convergence of critical infrastructure and artificial intelligence. 

Cybersecurity for Next Generation Connectivity Series

Rethinking Cybersecurity Architectures for Next-Gen Connectivity

Rethinking Cybersecurity Architectures for Next-Gen Connectivity

Rethinking Cybersecurity Architectures for Next-Gen Connectivity

In this introductory interview, Vikas Malhotra suggests mitigating cyber  risk by rethinking cybersecurity architectures in accordance with the  five principles proposed by the IEEE Committee on Cybersecurity for Next  Generation Connectivity: Human Centricity, Decentralization,  Distribution, Heterogeneity, and Self-Healing. 


For Cybersecurity Awareness Month 2025, Mission Critical is  collaborating with the IEEE Standards Association Committee on  'Cybersecurity for Next Generation Connectivity Systems' to facilitate  informative critical insights into current and emerging information  security topics. Each week in October 2025, the series will feature  expert perspectives from around the world on how to mitigate the  emerging threats and challenges associated with next-generation systems.


To Learn More Visit: 

https://sagroups.ieee.org/ic22-001/ 

Architectures and Foundational Principles

Rethinking Cybersecurity Architectures for Next-Gen Connectivity

Rethinking Cybersecurity Architectures for Next-Gen Connectivity

An insightful conversation with technology leader Belal Al-Hafnawi on  rethinking cybersecurity architectures for next-generation connectivity. From legacy systems to Zero Trust, we explored the growing role of artificial intelligence and its impacts on today’s cybersecurity  challenges, while questioning whether the Internet was ever designed to  be secure in the first place. This marks the first video of our Cybersecurity Awareness Month series. Since 2004, October has been a time to highlight the importance of cybersecurity and safe online  practices, not only in the United States, but around the world. The discussion was fully aligned with the five guiding principles of our  IEEE SA Cybersecurity for Next-Generation Connectivity Systems Study Group: human-centricity, decentralization, distributed processing, heterogeneity, and self-healing. 


For Cybersecurity Awareness Month 2025, Mission Critical is collaborating with the IEEE Standards Association Committee on 'Cybersecurity for Next Generation Connectivity Systems' to facilitate informative critical insights into current and emerging information  security topics. Each week in October 2025, the series will feature expert perspectives from around the world on how to mitigate the emerging threats and challenges associated with next-generation systems.  


To Learn More Visit: 

https://sagroups.ieee.org/ic22-001/ 

Developing Resilient Cybersecurity Leaders

Developing Resilient Cybersecurity Leaders

Developing Resilient Cybersecurity Leaders

The cybersecurity workforce is under unprecedented pressure to adapt,  innovate, and build resilience in the face of escalating threats.  Leadership plays a pivotal role in shaping this future-ready workforce.  This session, “Developing Resilient Cybersecurity Leaders,” will explore how executives and practitioners can expand participation in cybersecurity, remove barriers to entry, and strengthen professional pipelines through mentorship and support.


Drawing on real-life challenges, market barriers, and ongoing initiatives, the discussion will spotlight inspiring success stories that demonstrate what is possible when leaders commit to cultivating a broader, more sustainable workforce. Participants will gain insights into why workforce breadth is essential not only for resilience but also for driving innovation, and how practical leadership actions, such as mentorship, can help grow the next generation of cyber defenders.  


For Cybersecurity Awareness Month 2025, Mission Critical is collaborating with the IEEE Standards Association Committee on  'Cybersecurity for Next Generation Connectivity Systems' to facilitate informative critical insights into current and emerging information security topics. Each week in October 2025, the series will feature expert perspectives from around the world on how to mitigate the emerging threats and challenges associated with next-generation systems.  


To Learn More Visit:  

https://sagroups.ieee.org/ic22-001/  

Securing Open Ecosystems and Supply Chains

Developing Resilient Cybersecurity Leaders

Developing Resilient Cybersecurity Leaders

The networks and systems supporting society are growing increasingly  complex, diverse, and distributed as collaboration with vendors  increases, networks become interconnected and integrated, and  functionality becomes more pervasive. Meanwhile, the attack surface  grows in similar proportions. In this “Cybersecurity for Next Generation  Systems” series discussion, Dr. Lourenço Alves Pereira Jr. explains how  we can begin to measure trust, verify integrity, and leverage secure  architecture as part of the solution.  


For Cybersecurity Awareness Month 2025, Mission Critical is  collaborating with the IEEE Standards Association Committee on  'Cybersecurity for Next Generation Connectivity Systems' to facilitate  informative critical insights into current and emerging information  security topics. Each week in October 2025, the series will feature  expert perspectives from around the world on how to mitigate the  emerging threats and challenges associated with next-generation systems.  


To Learn More Visit:  

https://sagroups.ieee.org/ic22-001/   

  • Leaders
  • Partners
  • Foundational Principles
  • Digital Library
  • Collaborate

Mission Critical

Copyright © 2025 Mission Critical - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept