{"id":72116,"date":"2025-08-11T06:00:00","date_gmt":"2025-08-11T10:00:00","guid":{"rendered":"https:\/\/statescoop.com\/?p=72116"},"modified":"2025-08-18T10:48:49","modified_gmt":"2025-08-18T14:48:49","slug":"cisa-state-local-cyber-ms-isac-2025","status":"publish","type":"post","link":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/","title":{"rendered":"CISA says it&#8217;s not abandoning the states. Cyber officials aren&#8217;t so sure"},"content":{"rendered":"\n<p>Federal programs designed to aid in protecting critical infrastructure operated by state and local governments have wilted during the first six months of Donald Trump\u2019s second presidency, and technology officials have noticed.<\/p>\n\n\n\n<p>Numerous state and local officials shared with StateScoop a belief that they will need to be more self-reliant in the years ahead, as keystone cyber programs are abandoned or scaled back, and as they receive fewer communications from the Cybersecurity and Infrastructure Security Agency, the federal cyber bureau that has in recent years served as a uniquely valuable coordinator of the nation\u2019s sprawling IT defense efforts.<\/p>\n\n\n\n<p>Of particular concern for many state and local technology officials are recent federal cuts to the Multi-State Information Sharing and Analysis Center, a group that for more than 20 years has shared critical cybersecurity intelligence across state lines and provided threat monitoring services and other resources at free or heavily discounted rates. Five associations representing state and local governments <a href=\"https:\/\/statescoop.com\/ms-isac-nasico-naco-letter-congress-state-local-cyber\/\">last week wrote a letter<\/a> to congressional appropriations leaders urging them to reinstate the MS-ISAC&#8217;s funding.<\/p>\n\n\n\n<p>\u201cEvery day, we use MS-ISAC\u2019s services to protect the private data of citizens and the operation of hundreds of thousands of public schools, hospitals, utilities, law enforcement, courts, and other essential critical infrastructure across the country,\u201d they wrote.<\/p>\n\n\n\n<p>Officials have said they&#8217;re concerned by the dwindling interest in Washington to support a group that provides timely intelligence and preventative services, particularly when it would be expensive, difficult and time-consuming to recreate those services elsewhere. The group prides itself on offering its roughly 19,000 members \u201cshared services, real-time intelligence, and enterprise-grade threat detection at scale,\u201d according to a report it recently published.<\/p>\n\n\n\n<p>After <a href=\"https:\/\/statescoop.com\/ms-isac-loses-federal-support\/\">losing about $8.5 million<\/a> in federal funding last March, the MS-ISAC\u2019s operator, the Upstate New York nonprofit Center for Internet Security, <a href=\"https:\/\/statescoop.com\/ms-isac-funding-cuts-services-continue-2025\/\">began providing about $1 million<\/a> each month in emergency funding so it could continue serving its members. But that funding may stop at the end of September when the center switches <a href=\"https:\/\/www.cisecurity.org\/ms-isac\/ms-isac-membership-faq\">to a subscription model<\/a>, charging states according to their IT operating budgets. Its cooperative agreement with the Department of Homeland Security is also set to expire at the end of September, the end of the fiscal year, and the Department of Homeland Security hasn&#8217;t said publicly whether the group&#8217;s funding or agreement will be renewed.<\/p>\n\n\n\n<p>\u201cMy reading of the tea leaves is that that is not a high probability,\u201d Chris Gergen, North Dakota\u2019s chief information security officer, said of MS-ISAC odds of seeing its funding renewed. \u201cIf that happens, my perspective is that we are going to see a growing reliance on state cyber programs and state-driven initiatives to really help some of those underfunded and underserved entities.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cisa-has-not-wavered\">\u2018CISA has not wavered\u2019<\/h3>\n\n\n\n<p><a href=\"https:\/\/statescoop.com\/federal-cuts-election-security-secretaries-state-2025\/\">Last February<\/a>, the Center for Internet Security\u2019s Elections Infrastructure ISAC lost its federal funding, along with its cooperative agreement with the federal government, leading to its closure. The EI-ISAC is <a href=\"https:\/\/www.cisa.gov\/resources-tools\/groups\/join-elections-infrastructure-information-sharing-and-analysis-center-ei-isac\">still advertised on CISA\u2019s website<\/a>, accompanied by a warning that it\u2019s an archived page that \u201cmay not reflect current policy or programs.\u201d DHS officials have repeatedly pointed out to StateScoop that the EI-ISAC is not prohibited from operating. But many states are barred from accepting help with elections from any group that does not have a cooperative agreement with the federal government, a legal trend that took off after the 2016 election.<\/p>\n\n\n\n<p>With every program it has diminished or position it has eliminated, CISA has maintained that cuts have amounted only to reconciling newly unearthed redundancies. In an emailed statement, Marci McCarthy, CISA\u2019s director of public affairs, responded to a belief imparted by a growing number of officials that <a href=\"https:\/\/cyberscoop.com\/arizona-secretary-of-state-website-hack-candidate-portal-criticizes-cisa\/\">they can no longer rely<\/a> on the federal government for the same level of cybersecurity support they\u2019ve received under previous administrations.<\/p>\n\n\n\n<p>\u201cCISA has not wavered in our support to state and local partners and our commitment to them will not change,\u201d McCarthy\u2019s statement read. \u201cWe deliver a full suite of cyber and physical security capabilities at no cost. Our regional teams work directly with officials on the ground across the country to assess risks, strengthen defenses, and enhance resilience. CISA team members provide the right support to state and local partners in real time to help them anticipate emerging threat and sustain secure operations.\u201d<\/p>\n\n\n\n<p>Rob Beach, who serves as the chief technology officer for Cocoa, Florida, a small coastal city a forty minute drive east from Orlando, said that although he still &#8220;absolutely&#8221; considers CISA a \u201cvalued partner,\u201d he lamented that the nation\u2019s critical infrastructure \u2014 schools, hospitals, water treatment facilities and public safety offices \u2014 are increasingly being left to defend against attacks on their own.<\/p>\n\n\n\n<p>\u201cThe majority of this nation\u2019s critical infrastructure is run by local governments,\u201d said Beach, who sits on MS-ISAC\u2019s executive committee. \u201cThis isn\u2019t a local government problem. This is a national security problem and it requires federal-level attention.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-difficult-spot\">\u2018A difficult spot\u2019<\/h3>\n\n\n\n<p><a href=\"https:\/\/learn.cisecurity.org\/strengthening-critical-infrastructure-sltt-progress-priorities-full-report-vol2\">A new MS-ISAC report<\/a> paints the decline in federal cybersecurity supports \u2014 in the form of funding, program subsidies and services provided directly by federal agencies \u2014 as a potentially costly gamble. The DOGE phenomenon kicked off by Elon Musk that fetishizes the leanest possible operations precipitated widespread cuts throughout the federal government that have led to many harmful outcomes, ranging from deep cuts to medical research to <a href=\"https:\/\/statescoop.com\/devastating-floods-central-texas-warning-systems-nws\/\">reductions of key personnel<\/a> at emergency management agencies, which may have impaired their ability to support several recent disasters. Analysts now warn that cuts to cybersecurity could prove disastrous if additional cyberattacks are allowed through. Single events of sufficient size, such as <a href=\"https:\/\/cyberscoop.com\/crowdstrike-falcon-flaw-microsoft-outage-flights-grounded-windows\/\">last year\u2019s Crowdstrike outage<\/a>, caused by a faulty update, or the <a href=\"https:\/\/cyberscoop.com\/ransomware-alphv-healthcare-pharmacies\/\">Change Healthcare<\/a> ransomware attack, have each cost the nation billions of dollars in lost productivity and recovery expenses.<\/p>\n\n\n\n<p>Terry Loftus, the chief information officer for the San Diego County Office of Education and chair of MS-ISAC\u2019s executive committee, said there\u2019s seldom a meaningful distinction between the federal government\u2019s cybersecurity efforts and those of the rest of government. He pointed to <a href=\"https:\/\/statescoop.com\/industry-groups-alarmed-education-department-cuts-may-weaken-school-cybersecurity\/\">the elimination<\/a> of the Department of Education\u2019s Office of Educational Technology last March as one of numerous ill-conceived cuts by the Trump administration that has showcased the blurry boundaries of cybersecurity.<\/p>\n\n\n\n<p>\u201cThat\u2019s where the only cybersecurity folks talking about these things at a national level existed,\u201d he said. \u201cThat is all gone. It really puts us in a difficult spot.\u201d<\/p>\n\n\n\n<p>Loftus said that outside of the nation\u2019s largest school districts, most schools have scant funding or expertise to adequately manage their IT defenses. Recent surveys conducted by the MS-ISAC show that 22% of state, local, territorial and tribal governments have zero dollars dedicated only to cybersecurity. Forty-two percent operate with less than $100,000 annually for cybersecurity. Smaller organizations tend to be less prepared; seventy percent of jurisdictions of fewer 10,000 people don\u2019t have a multiyear cybersecurity plan.<\/p>\n\n\n\n<p>Ensuring that the smallest, least-resourced offices get help defending their systems is a niche that MS-ISAC has, over the years, filled with gusto. The group\u2019s new report boasts that it delivers \u201centerprise-grade capabilities to even the smallest jurisdictions,\u201d a feat accomplished through its industry connections, the bulk-pricing discounts it gets for services thanks to the group\u2019s wide (and steadily growing) membership and \u2014 critically \u2014 support from the federal government. <\/p>\n\n\n\n<p>The United States government isn&#8217;t a monolith, but MS-ISAC has done its best to afford its far-flung members the defensive advantages of scale and sophistication as if it were. And, CISA notwithstanding, it&#8217;s often the only game in town. One recent survey of the group&#8217;s members, Loftus said, showed that more than 80% believe they would be unable to find affordable alternatives to MS-ISAC services, should they disappear.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-trying-to-fight\">\u2018Trying to fight\u2019<\/h3>\n\n\n\n<p>The MS-ISAC is still operating, but with its support enervated, and with CISA and other federal agencies shrinking, many technology officials are now sketching out contingency plans. But who else could fill MS-ISAC\u2019s and CISA\u2019s roles as national coordinators? Loftus said that before Trump 2.0, CISA sometimes handed off cyber matters related to state or local government to the MS-ISAC, but that he no longer knows how state and local issues will be handled, particularly as CISA\u2019s own staffing levels shrink.<\/p>\n\n\n\n<p>Derek Tisler, a counsel at the Brennan Center for Justice, a Washington think tank, said state and local officials are especially concerned about how they will secure their elections infrastructure.<\/p>\n\n\n\n<p>\u201cOne of the biggest gaps that came up over and over is that the federal government both served as and supported information-sharing networks that were incredibly important for being able to see and anticipate challenges that are taking place outside of your borders,\u201d Tisler said. \u201cThis is something a lot of state officials have come to realize \u2014 that they may not be able to rely on the federal government for as much information anymore.\u201d<\/p>\n\n\n\n<p>State and local officials had come to treasure the EI-ISAC and MS-ISAC for their ability to aggregate large amounts of information on network traffic from around the country and feed back the most salient bits to the agencies that might need them. And as membership organizations, ISACs are viewed by some, local governments especially, as less intimidating than federal agencies that might provide similar types of support.<\/p>\n\n\n\n<p>When protecting elections, Tisler said, a friendly organization like the EI-ISAC, that could provide a nationwide view of threats, was invaluable. He said this structure is especially effective because nation-state actors don\u2019t necessarily think in terms of particular cities or counties \u2014 they\u2019re just going after infrastructure, and that means the nation\u2019s 10,000 election officials truly have a common cause. And with a group like the EI-ISAC to bind them together, they were no longer fighting alone.<\/p>\n\n\n\n<p>\u201cMany election officials have no full-time staff to rely on,\u201d Tisler said. \u201cThey may even be in a part-time position in more rural areas. They don\u2019t have the time or capacity to be seeking out these services.\u201d<\/p>\n\n\n\n<p>Or as Beach, the tech chief in Cocoa put it: \u201cWe\u2019re trying to fight nation-state actors on municipal budgets.\u201d<\/p>\n\n\n\n<p>\u201cI don\u2019t think the adversaries are cutting their budgets. I think they\u2019re ramping up actually. We\u2019re seeing a lot of activity from these foreign states, especially the Big Four,\u201d Beach added, pointing to China, Iran, North Korea and Russia.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-comfortable-size\">A comfortable size<\/h3>\n\n\n\n<p><a href=\"https:\/\/statescoop.com\/state-election-cybersecurity-brennan-center-report\/\">A recent report<\/a> by the Brennan Center and the R Street Institute, another Washington think tank, suggests that state and regional security operations centers could be the ones to pick up the slack dropped by the federal government. The most prominent is North Dakota\u2019s Joint Cyber Security Operations Center, which started in 2019 when North Dakota banded with Montana and South Dakota. The group now includes 15 states. Gergen, the North Dakota CISO who helped stand up the center, said the other member states prefer to remain anonymous.<\/p>\n\n\n\n<p>The JCSOC isn\u2019t a building or a legal entity, Gergen said, but an agreement. His state\u2019s IT security division employs several dozen full-time employees and many of them spend a \u201csmall portion\u201d of their time working on the center. That work, he said, equates to sharing threat intelligence across state lines and, in the event that a crisis hits one of the member states, &#8220;effectively&#8221; providing staffing support.<\/p>\n\n\n\n<p>Gergen said he \u201csaw the value in MS-ISAC.\u201d But he also saw shortcomings that motivated the creation of his group.<\/p>\n\n\n\n<p>\u201cA lot of the threat intelligence sharing would bubble up from states to MS-ISAC,\u201d he said. \u201cIt would get anonymized and then it would get shared back out, which was fine \u2026 but it didn\u2019t really open up avenues to know the state or the people that were behind the intelligence being shared, if you wanted more context and wanted more information.\u201d<\/p>\n\n\n\n<p>He named other shortcomings, like the Center for Internet Security\u2019s policy of only sharing the parts of its Nationwide Cybersecurity Review that apply to each organization it\u2019s shared with. For North Dakota\u2019s CISO this is of unique interest because his network is widely used across the state \u2014 by cities, counties, school districts, universities, the state\u2019s 911 system, its elections infrastructure and public radio network. He\u2019s responsible for securing more than a quarter million endpoints, so he conducts his own statewide cyber assessments to understand who needs help.<\/p>\n\n\n\n<p>Some states included in North Dakota&#8217;s JCSOC have set up automated sharing of threat information. This means states can get notices from across state lines in real time \u2014 faster, Gergen said, than they get it through the MS-ISAC, which anonymizes its data before sharing.<\/p>\n\n\n\n<p>\u201cWe\u2019ve had a number of incidences where states have been under attack and have brought live [tactics, techniques and procedures] to that group, like [indicators of compromise], whether it be IP addresses or whether it be queries that they ran in their environment, have been able to share that with us or we\u2019ve been able to share it with them that have then resulted in uncovering additional intrusions in some other state networks,\u201d he said.<\/p>\n\n\n\n<p>Gergen predicted that as the federal government continues to pull back cybersecurity support, JCSOC members will be interested in how their group might fill the gaps.<\/p>\n\n\n\n<p>But even despite the MS-ISAC\u2019s flaws, he said, the JCSOC was never intended to replace it, and that he still considers it a valuable tool to be used in conjunction with other resources. (He also expressed disappointment that <a href=\"https:\/\/statescoop.com\/state-local-cyber-grant-msisac-2025\/\">new rules<\/a> included in the State and Local Cybersecurity Grant Program, a $1 billion pot of funds designed to bolster local governments&#8217; cybersecurity, prohibit spending on MS-ISAC services.)<\/p>\n\n\n\n<p>And as for additional states joining the JCSOC, North Dakota&#8217;s not necessarily looking for new members.<\/p>\n\n\n\n<p>\u201cWe\u2019ve hit a size that we\u2019re probably comfortable with,\u201d Gergen said.<\/p>\n\n\n\n<p>Both the Brennan Center and the Center for Internet Security recommend state and regional SOCs work in conjunction with the MS-ISAC. Such an organizational model mirrors the \u201cdefense in depth\u201d strategy long favored by IT security professionals that arranges redundant fortifications to avoid single points of failure that can be exploited by bad actors.<\/p>\n\n\n\n<p>Under this conception of the group, the MS-ISAC could only be replaced by something just like it. Numerous people interviewed for this story said that recreating the MS-ISAC from scratch would be laborious, costly and pointless, since it already exists.<\/p>\n\n\n\n<p>\u201c[We\u2019re seeing] a shifting perspective of pushing cybersecurity responsibility back onto the states and the local government entities,\u201d Gergen said. \u201cCollaboration has always been important to me and important to our program here, but I think it\u2019s going to become all the more important as we continue to see this responsibility shift down to the lower levels.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-no-longer-there\">\u2018No longer there\u2019<\/h3>\n\n\n\n<p>In yet another reduction of CISA\u2019s capabilities, the agency\u2019s Joint Cyber Defense Collaborative recently <a href=\"https:\/\/www.cybersecuritydive.com\/news\/cisa-joint-cyber-defense-collaborative-contract-lapse\/756231\/\">saw its number of contractors reduced<\/a> from more than 100 to just 10.<\/p>\n\n\n\n<p>\u201cJCDC is the primary group that provides these spaces and places for collaboration and sharing and so forth,\u201d said Loftus, the MS-ISAC chair. \u201cAnd this is the main way that we interact, as MS-ISAC, with CISA.\u201d<\/p>\n\n\n\n<p>Even before those cuts, Loftus said, he\u2019d begun to see the writing on the wall. He noticed that cuts to CISA\u2019s Integrated Operations Division had resulted in less frequent support. CISA staff who\u2019d traveled to regional events and local government offices to provide advice are simply \u201cno longer there,\u201d he said.<\/p>\n\n\n\n<p>\u201cEvents and meetings and things in the last six months where CISA had committed to attending and engage with this community, they withdrew from and did not send anyone,\u201d he said. \u201cWe have very clearly seen in many different ways where they have pulled back or not had the staff or given the approval to engage with [state, local, territorial and tribal] organizations like they had previously.\u201d<\/p>\n\n\n\n<p>Beach, the Cocoa tech chief, said CISA\u2019s absence was felt last month at a district meeting of the Florida Local Government Information Systems Association, which aims to equip local officials and critical infrastructure operators around the state with the resources they need to secure their systems.<\/p>\n\n\n\n<p>\u201cLast year we had two cyber advisers from CISA, which was great,\u201d Beach said. \u201cOne focused on the capabilities, one more focused on the law enforcement side, but we had two. This year we have zero. We no longer have a cyber adviser here.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As cybersecurity support from the federal government dwindles, state and local officials are considering their options.<\/p>\n","protected":false},"author":205,"featured_media":72248,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"disable_grayscale_images":true,"grayscale_contrast":0,"sponsored_content":false,"display_author_bio":true,"story_type":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20646],"tags":[13110,25761,25760,25759,25758,25720,25131,16538,16536,209,12178,5658,1008,1007,837,520,236],"people":[],"special-report":[],"authors":[4696],"class_list":["post-72116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-government-technology","tag-rob-beach","tag-terry-loftus","tag-sean-plankey","tag-jcdc","tag-chris-gergen","tag-technology-news","tag-cybersecurity-and-infrastructure-security-agency-cisa","tag-cybersecurity","tag-critical-infrastructure","tag-ciso","tag-brennan-center-for-justice","tag-center-for-internet-security","tag-ms-isac","tag-security-operations-center","tag-north-dakota","tag-information-sharing","author-colin-wood"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CISA says it&#039;s not abandoning the states. Cyber officials aren&#039;t so sure | StateScoop<\/title>\n<meta name=\"description\" content=\"As cybersecurity support from the federal government dwindles, state and local officials are considering their options.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA says it&#039;s not abandoning the states. Cyber officials aren&#039;t so sure | StateScoop\" \/>\n<meta property=\"og:description\" content=\"As cybersecurity support from the federal government dwindles, state and local officials are considering their options.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"StateScoop\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/StateScoop\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-11T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T14:48:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Colin Wood\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@State_Scoop\" \/>\n<meta name=\"twitter:site\" content=\"@State_Scoop\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/\",\"url\":\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/\",\"name\":\"CISA says it's not abandoning the states. Cyber officials aren't so sure | StateScoop\",\"isPartOf\":{\"@id\":\"https:\/\/statescoop.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg\",\"datePublished\":\"2025-08-11T10:00:00+00:00\",\"dateModified\":\"2025-08-18T14:48:49+00:00\",\"description\":\"As cybersecurity support from the federal government dwindles, state and local officials are considering their options.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/#primaryimage\",\"url\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg\",\"contentUrl\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg\",\"width\":1300,\"height\":844,\"caption\":\"(Colin Wood \/ Scoop News Group)\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/statescoop.com\/#website\",\"url\":\"https:\/\/statescoop.com\/\",\"name\":\"StateScoop\",\"description\":\"Latest news and events in state and local government technology\",\"publisher\":{\"@id\":\"https:\/\/statescoop.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/statescoop.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/statescoop.com\/#organization\",\"name\":\"StateScoop\",\"url\":\"https:\/\/statescoop.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/statescoop.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png\",\"contentUrl\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png\",\"width\":1470,\"height\":186,\"caption\":\"StateScoop\"},\"image\":{\"@id\":\"https:\/\/statescoop.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/StateScoop\/\",\"https:\/\/x.com\/State_Scoop\",\"https:\/\/www.linkedin.com\/company\/statescoop\/\",\"https:\/\/www.youtube.com\/@StateScoop\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISA says it's not abandoning the states. Cyber officials aren't so sure | StateScoop","description":"As cybersecurity support from the federal government dwindles, state and local officials are considering their options.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/","og_locale":"en_US","og_type":"article","og_title":"CISA says it's not abandoning the states. Cyber officials aren't so sure | StateScoop","og_description":"As cybersecurity support from the federal government dwindles, state and local officials are considering their options.","og_url":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/","og_site_name":"StateScoop","article_publisher":"https:\/\/www.facebook.com\/StateScoop\/","article_published_time":"2025-08-11T10:00:00+00:00","article_modified_time":"2025-08-18T14:48:49+00:00","og_image":[{"width":1300,"height":844,"url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg","type":"image\/jpeg"}],"author":"Colin Wood","twitter_card":"summary_large_image","twitter_creator":"@State_Scoop","twitter_site":"@State_Scoop","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/","url":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/","name":"CISA says it's not abandoning the states. Cyber officials aren't so sure | StateScoop","isPartOf":{"@id":"https:\/\/statescoop.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/#primaryimage"},"image":{"@id":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg","datePublished":"2025-08-11T10:00:00+00:00","dateModified":"2025-08-18T14:48:49+00:00","description":"As cybersecurity support from the federal government dwindles, state and local officials are considering their options.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/#primaryimage","url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg","contentUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg","width":1300,"height":844,"caption":"(Colin Wood \/ Scoop News Group)"},{"@type":"WebSite","@id":"https:\/\/statescoop.com\/#website","url":"https:\/\/statescoop.com\/","name":"StateScoop","description":"Latest news and events in state and local government technology","publisher":{"@id":"https:\/\/statescoop.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/statescoop.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/statescoop.com\/#organization","name":"StateScoop","url":"https:\/\/statescoop.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/statescoop.com\/#\/schema\/logo\/image\/","url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png","contentUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png","width":1470,"height":186,"caption":"StateScoop"},"image":{"@id":"https:\/\/statescoop.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/StateScoop\/","https:\/\/x.com\/State_Scoop","https:\/\/www.linkedin.com\/company\/statescoop\/","https:\/\/www.youtube.com\/@StateScoop"]}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"CISA says it&#8217;s not abandoning the states. Cyber officials aren&#8217;t so sure","url":"http:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/statescoop.com\/cisa-state-local-cyber-ms-isac-2025\/"},"thumbnailUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg"},"articleSection":"Cybersecurity","author":[{"@type":"Person","name":"Colin Wood","url":"https:\/\/statescoop.com\/author\/colin-wood\/"}],"creator":["Colin Wood"],"publisher":{"@type":"Organization","name":"StateScoop","logo":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/cropped-ss_favicon.png"},"keywords":["brennan center for justice","center for internet security","chris gergen","ciso","critical infrastructure","cybersecurity","cybersecurity and infrastructure security agency (cisa)","government technology","information sharing","jcdc","ms-isac","north dakota","rob beach","sean plankey","security operations center","technology news","terry loftus"],"dateCreated":"2025-08-11T10:00:00Z","datePublished":"2025-08-11T10:00:00Z","dateModified":"2025-08-18T14:48:49Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"CISA says it&#8217;s not abandoning the states. Cyber officials aren&#8217;t so sure\",\"url\":\"http:\\\/\\\/statescoop.com\\\/cisa-state-local-cyber-ms-isac-2025\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/statescoop.com\\\/cisa-state-local-cyber-ms-isac-2025\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/statescoop.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/08\\\/2025-08-07.jpg?w=150&h=150&crop=1\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/statescoop.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/08\\\/2025-08-07.jpg\"},\"articleSection\":\"Cybersecurity\",\"author\":[{\"@type\":\"Person\",\"name\":\"Colin Wood\",\"url\":\"https:\\\/\\\/statescoop.com\\\/author\\\/colin-wood\\\/\"}],\"creator\":[\"Colin Wood\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"StateScoop\",\"logo\":\"https:\\\/\\\/statescoop.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2023\\\/01\\\/cropped-ss_favicon.png\"},\"keywords\":[\"brennan center for justice\",\"center for internet security\",\"chris gergen\",\"ciso\",\"critical infrastructure\",\"cybersecurity\",\"cybersecurity and infrastructure security agency (cisa)\",\"government technology\",\"information sharing\",\"jcdc\",\"ms-isac\",\"north dakota\",\"rob beach\",\"sean plankey\",\"security operations center\",\"technology news\",\"terry loftus\"],\"dateCreated\":\"2025-08-11T10:00:00Z\",\"datePublished\":\"2025-08-11T10:00:00Z\",\"dateModified\":\"2025-08-18T14:48:49Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/statescoop.com\/p.js"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/2025-08-07.jpg","distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"StateScoop","distributor_original_site_url":"https:\/\/statescoop.com","push-errors":false,"_links":{"self":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts\/72116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/comments?post=72116"}],"version-history":[{"count":53,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts\/72116\/revisions"}],"predecessor-version":[{"id":72390,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts\/72116\/revisions\/72390"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/media\/72248"}],"wp:attachment":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/media?parent=72116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/categories?post=72116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/tags?post=72116"},{"taxonomy":"people","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/people?post=72116"},{"taxonomy":"special-report","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/special-report?post=72116"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/authors?post=72116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}