What Does Whole-of-State Cybersecurity Imply for U.S. Cities and Counties?

Published:

Strengthening Cybersecurity: A Whole-of-State Approach in the U.S.

In an era where cyber threats loom larger than ever, states across the U.S. are stepping up their cybersecurity efforts with innovative funding and collaborative strategies. From Texas to New York, and Minnesota to North Carolina, various initiatives are being implemented to bolster the cyber defenses of local governments and agencies. This article explores how these states are leveraging federal funds, shared services, and collaborative frameworks to enhance their cybersecurity posture.

Texas: A Focus on Grants and Collaboration

Texas has secured $40 million in federal funds to be allocated over four years for projects aligned with the state’s State and Local Cybersecurity Grant Program (SLCGP) Cybersecurity Plan. This funding is not just a financial boon; it comes with specific requirements aimed at ensuring that successful applicants are well-prepared to tackle cybersecurity challenges.

Grantees must engage in web application vulnerability scanning and conduct annual cybersecurity reviews, both of which are supported by federal resources at no cost. Additionally, recipients are required to join the Texas Information Sharing and Analysis Organization (TISAO), a collaborative group focused on cybersecurity education and information sharing. This multi-faceted approach emphasizes the importance of not only funding but also collaboration and continuous improvement in cybersecurity practices.

New York: A Unified Security Operations Center

In New York, the state has taken a different yet equally comprehensive approach to cybersecurity. In 2022, Governor Kathy Hochul announced the establishment of the Joint Security Operations Center (JSOC), designed to provide a holistic view of cyber threats while enhancing security coordination among various government entities.

Hochul emphasized the need for a rigorous approach to cybersecurity, likening it to the improvements made in physical security following the events of 9/11. The JSOC aims to foster collaboration and information sharing among state and local governments, ensuring that they are better equipped to respond to emerging cyber threats.

Minnesota: Shared Services and Collective Buying Power

Minnesota is also making strides in cybersecurity through a shared-services model. The state, with the involvement of Minnesota IT Services and the Minnesota Cybersecurity Task Force, has outlined plans to utilize $23.5 million in federal and state funding.

A significant portion of this funding—at least 80%—is earmarked for programming, with 25% specifically allocated for rural and tribal areas. The overarching goals include enhancing cybersecurity detection and defensive tools, improving threat intelligence analysis, and enabling access to essential security products and services.

Israel, Minnesota’s Chief Information Security Officer (CISO), highlighted the importance of providing foundational cybersecurity capabilities to smaller governments. This collective buying power can lead to better security tools, such as real-time alerts and advanced monitoring dashboards, which are crucial for rapid response to cyber incidents.

North Carolina: Contracting for Cost Efficiency

North Carolina has adopted a strategic approach to cybersecurity contracting, which is integral to its whole-of-state cybersecurity efforts. The North Carolina Department of Information Technology (NCDIT) has developed a comprehensive state term contract that offers a flexible portfolio of cybersecurity software, products, and services.

This pre-negotiated agreement allows various government entities to access best-in-class cybersecurity technologies at reduced costs. By purchasing tools in bulk, the state can provide local governments with affordable options that would otherwise be financially prohibitive. NCDIT is also actively seeking additional funding to support small governments in their fight against cyber threats.

Indiana: Flexibility and Guidance for Local Governments

In Indiana, the emphasis is on flexibility and cooperation between state and local governments. Kent Kroft, the Chief Information Officer of Tippecanoe County, underscored the importance of state guidance in achieving common cybersecurity goals without imposing a one-size-fits-all policy.

The state has recognized the unique needs of its communities, opting to analyze specific areas of vulnerability before distributing federal funds. For instance, New Hampshire’s approach involved encouraging local agencies to adopt the .gov domain, which is generally considered more secure. This tailored strategy aims to fill cybersecurity gaps effectively.

The Future of Whole-of-State Cybersecurity

While these initiatives represent significant progress in enhancing cybersecurity, concerns remain about the sustainability of funding. As Drew Bagley from CrowdStrike noted, the long-term success of whole-of-state cybersecurity efforts hinges on consistent funding and strategic planning. The SLCGP funding, which could run out in 2025, poses a potential threat to the momentum gained in recent years.

Local leaders, like DeWitt from Indiana, are advocating for more resources to protect critical infrastructure, such as water utilities, from cyber attacks. The need for ongoing investment in cybersecurity, particularly for small and rural communities, is paramount to ensure that they are not left vulnerable.

Conclusion

The whole-of-state approach to cybersecurity is gaining traction across the United States, with states like Texas, New York, Minnesota, North Carolina, and Indiana leading the charge. By leveraging federal funds, fostering collaboration, and adopting flexible strategies, these states are working to create a more secure digital environment for their citizens. However, the sustainability of these efforts will depend on continued investment and a commitment to addressing the evolving landscape of cyber threats. As we move forward, it is crucial to maintain the momentum and ensure that all communities, regardless of size, have access to the resources they need to defend against cyber risks.

Related articles

Recent articles