State and Local Governments' Shared Cyber Defense Is Going to Change. The Question Is How.

The Empire State Plaza in Albany, New York. The Multi-State Infromation Security and Analysis Center resides across the river in East Greenbush, New York

The Empire State Plaza in Albany, New York. The Multi-State Infromation Security and Analysis Center resides across the river in East Greenbush, New York Paul Brady Photography / Shutterstock.com

 

Connecting state and local government leaders

With growing demand, the MS-ISAC risks becoming a victim of its own success.

As cybersecurity threats to state and local governments continue to grow, the federally funded nonprofit that provides threat information and analysis is under increasing demand.

The Multi-State Information Sharing and Analysis Center, better known as MS-ISAC, is tasked with boosting the overall cybersecurity postures of state, local, tribal and territorial governments. But as it membership increases, along with the number and sophistication of attacks, the question that hangs over the organization today is whether it will be able to provide the same level of support its members praise it for—and if not, what does the organization’s future look like?

As one member told Route Fifty, “Obviously there’s a benefit to bringing as many people in, but there’s also the potential to where you’re not able to support that entire base.”

Security With a Personal Touch

In January 2003, a handful of information security professionals from northeastern states gathered in New York City to discuss sharing information on cyber threats they were seeing in their environment. They were led by Will Pelgrin, then-chief information security officer of New York state. The next year, with an initial pilot grant from the U.S. Department of Homeland Security, the MS-ISAC became a formal entity in earnest and other states quickly joined in.

Pelgrin moved from his role with New York to run the MS-ISAC. Public universities and other state entities began to join, and in 2011 the organization swung its doors open to localities.

Almost 15 years removed from that initial informal group of state security professionals meeting in New York City, the non-profit organization now boasts members from “all 56 states and territories, all 50 state capitals, all 78 fusion centers, over 1,000 local governments” and many tribal governments, as well.

The task is enormous. The local governments involved represent over 60 percent of the U.S. population. That doesn’t include the public infrastructure providers like airports, public utilities and mass transit systems. Following last year’s election, MS-ISAC began expanding its support to election authorities—work it expects to grow in the years ahead.

“We were figuring out what we were going to do and how we were going to do it, and how we were going to partner together,” Elayne Starkey, CISO for the state of Delaware, told Route Fifty about the first meeting. “It’s amazing to look back and see how far the organization has come.”

Starkey said the support provided in those early years was “invaluable as we built the program in Delaware.” In interviews with several current and former state information security officers, I found that sentiment to be nearly unanimous—the MS-ISAC has been vital in helping states continue to mature their security operations in the face of an ever-increasing cybersecurity threat.

“I think we are a stronger cybersecurity program with the support that they provided,” Mississippi’s Chief Information Security Officer Jay White, explained. He cited the ALBERT network monitoring program, a tailored variation on the federal government’s EINSTEIN program, as an example of the organization significantly upgrading the state’s security posture.

Growing Pains

In 2015, MS-ISAC’s chair and long-time driving force behind its growth, Pelgrin, retired. Thomas Duffy now serves as chair and is tasked with ensuring the organization can continue to provide quality service to its growing membership.

Duffy attended that initial meeting in New York City, having served as deputy to Pelgrin in New York state at that time, and ultimately played a parallel role as his No. 2 at the MS-ISAC until Pelgrin’s retirement in 2015.

To Duffy, much of the solution to keeping up with membership growth can be found in building tools to expand the organization’s services. “If you can automate it, it doesn’t matter if you’re doing an analysis for a hundred people or a thousand people,” Duffy said. “If you get it automated, you can scale much faster.”

Duffy had just finished his speech to the National Association of State Technology Directors at their Annual meeting, where he provided examples of how MS-ISAC is embracing automation and meeting the needs of its growing membership. For instance, MS-ISAC created a script a few years ago to scan its members’ websites each week for vulnerabilities—over 27,000 of them by his count.

More members also gives the MS-ISAC a larger pool of threat intelligence to share. As Starkey explained to me, “There are many large cities and large counties that are even larger than the state of Delaware, so from that standpoint that helps as far as our intelligence feeds and the trend data… I think that’s helpful to a small state like ours.”

The organization is also exploring ways of analyzing and preventing unique cyber threats that haven’t been encountered before. That type of technology, known as non-signature based detection, is increasingly becoming standard in the enterprise cybersecurity market. According to Michael Atkinson, national solutions architect for state and local government at FireEye, “over 80 percent of all malware strains are used once and never reused again,” making non-signature detection vital.

Currently threat intel and data is still sent to members by email. However, the organization is working with Illinois and Maine on ways to integrate their threat information into members’ cybersecurity interfaces known as security information and event management systems, or SIEMs. It is also investigating a port scanning technology, to better secure local governments as they enter the “smart city” age, integrating vital infrastructure with the power of the internet.

Technology is increasingly automating what was once an informal professional information sharing network.

And, while automation helps solve the issue of scale, it does erode personal interaction. The network of members today is both larger and more diverse. While annual meetings used to consist of 40 to 50 state representatives, the last event had about 400 people from organizations with a myriad of different responsibilities and facing different threats.

As such, some of the comradery of the original state group seems to be more difficult to find among the sea of new members, according to some long-standing members of the MS-ISAC.

“It’s a tough charter when you think about it, especially since the expansion,” Starkey said. “I think when they were a state-only focused organization the requirements were much simpler and yes, we were all at different maturity points but there was a common state government thread. … We, meaning the state CISOs, have had to work harder to maintain those connections.”

The MS-ISAC is trying to tackle that aspect of growth with internal opportunities for smaller networking and information exchange opportunities.

For instance, White co-chairs a committee that created a mentoring program for new security leaders in management positions. The MS-ISAC has also created segmented discussion channels for various sectors of membership, such as airports, K-12 and higher education.

Duffy recognizes the complications of growth and supporting a broader membership base. “It’s been challenging, because when it was just the states, you had more intimate contact with each state CISO. As we grew, you just naturally you don’t have that intimate contact.”

It’s Always a Question of Money

As with most things in government, the elephant in the room is the organization’s long-term is funding. Among the attractive features of the MS-ISAC is that its services and support are free to its members, care of Uncle Sam.

As the threat and members grow, there is a question of whether the existing Homeland Security funding will be sufficient for the increased demand.

If not, the MS-ISAC could potentially try to charge for portions of services. However, fees or cost-sharing would create a multitude of difficulties for MS-ISAC and its members—from small localities who could not afford the extra costs to state procurement rules that could require competitive bidding for services.

Funding limitations could also hinder the ability of the MS-ISAC to keep pace with evolving cyber threats. “I’m sure I could come up with a list of ‘I wish we could do this and this and this’ from the MS-ISAC, but that’s kind of unrealistic,” Starkey said to me when I asked about what other services she hoped to see from the organization. “It requires new budget and new dollars to do some of those additional services and I’m not aware of any new dollars that are on the horizon.”

Starkey wasn’t concerned about with how the MS-ISAC would deal with the growth or support from the federal government. “I’m confident in Tom [Duffy]’s leadership to adjust to those shifting priorities. He’s made strong cases to the decision-makers in terms of demonstrating the value of the MS-ISAC.”

Duffy, in turn, believes his partners on the federal side understand the value proposition of the MS-ISAC, and how better security for state and local entities means better security for the federal government—and the nation writ large.

He told me there has been no change in “support and attitude” with the transition to the Trump administration. “The current folks we deal with are tremendously supportive.”

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.