Categories
Budgeting & Resources

Cybersecurity Financing: Risk-Based Budgeting for Local Governments

Why risCybersecurity is no longer just a technical line item—it’s a strategic investment in the continuity, safety, and trustworthiness of public services. Yet for many local governments, financing cybersecurity remains a challenge. Limited budgets, competing priorities, and rising threat levels create a complex environment for decision-makers.

To navigate this landscape, municipalities must adopt a risk-based approach to cybersecurity budgeting—one that aligns spending with the potential impact and likelihood of threats.


Why Risk-Based Budgeting Matters

Local governments operate under tight financial constraints, but the risks posed by cyber threats continue to escalate. A reactive or ad hoc approach to cybersecurity spending can leave critical systems exposed while wasting resources on low-impact threats.

Risk-based budgeting helps leaders:

  • Focus resources on the most critical vulnerabilities.
  • Avoid overspending on non-essential tools or services.
  • Align cybersecurity investments with broader public service goals.

Understanding the full financial exposure to cyber risk—including direct costs (e.g., legal fees), indirect costs (e.g., reputational damage), and insurance implications—is essential for informed decision-making.


Key Components of Cybersecurity Financing

1. Centralized and Intentional Budgeting

Cybersecurity should be treated as an enterprise-wide priority. Budgeting must be centralized to ensure consistency, accountability, and strategic alignment across departments.

2. Formal Business Cases

Major cybersecurity expenditures—such as infrastructure upgrades or third-party services—should be justified through formal business cases. These cases should tie spending to specific service outcomes and risk reduction goals.

3. Procurement and Policy Alignment

All cybersecurity purchases must follow established procurement policies and be aligned with public accountability standards. Transparency in vendor selection and contract terms is essential.

4. Cost Exposure Analysis

Local governments should assess the full financial impact of potential cyber incidents. This includes:

  • Direct Costs: Remediation, legal fees, fines.
  • Indirect Costs: Reputational damage, service disruption.
  • Insurance Costs: Premiums and post-incident rate increases.
  • Infrastructure Investments: Ongoing upgrades to secure systems.
  • Incident Response: Emergency teams, forensic investigations.
  • Credit Rating Impact: Potential increases in borrowing costs 2.

Best Practices for Trustees and Budget Officers

  • Require annual reviews of cybersecurity spending and outcomes.
  • Include cybersecurity in capital planning and long-term financial forecasts.
  • Conduct tabletop exercises to test financial readiness for cyber incidents.
  • Ensure that cybersecurity insurance coverage is adequate and up to date.

Cybersecurity financing is not just about protecting data—it’s about protecting the public. By adopting a risk-based budgeting strategy, local governments can make smarter investments, reduce exposure, and build more resilient communities.

Categories
Planning & Policy

From Deepfakes to Fake News: Local Strategies for Disinformation Response

Disinformation is one of the most pressing challenges facing local governments today. As trusted sources of public information, municipalities are increasingly targeted by campaigns designed to mislead, confuse, or destabilize communities. Whether it’s false claims about election procedures, fabricated emergency alerts, or impersonation of public officials, disinformation can erode public trust and disrupt essential services.

Responding effectively requires more than just correcting falsehoods—it demands a coordinated, proactive strategy that blends cybersecurity, communications, and community engagement.


What Is Disinformation?

Disinformation is deliberately false or misleading information spread with the intent to deceive, manipulate, or cause harm. Unlike misinformation—which is shared unknowingly—disinformation is strategic and often orchestrated to achieve specific outcomes.

In the context of local government, disinformation can take many forms:

  • Fake social media posts impersonating city officials or agencies.
  • False claims about voting procedures, public health mandates, or emergency responses.
  • Manipulated images or videos (e.g., deepfakes) that misrepresent events or statements.
  • Coordinated bot activity amplifying misleading narratives.
  • Fraudulent websites mimicking official portals to spread false information or collect personal data.

These tactics are designed to exploit public trust, create confusion, and undermine confidence in local institutions.


Why Local Governments Are Vulnerable

Local governments are particularly susceptible to disinformation because:

  • They manage critical services like elections, public safety, and health communications.
  • They often operate with limited resources and staffing to monitor digital threats.
  • They are deeply embedded in the daily lives of residents, making them high-impact targets.

Disinformation campaigns may be politically motivated, financially driven, or simply intended to sow chaos. Regardless of the source, the consequences can be severe—ranging from public panic to reputational damage and operational disruption.


Response Strategies for Local Governments

1. Establish a Cross-Functional Response Team

Bring together cybersecurity, communications, legal, and public affairs staff to monitor, assess, and respond to disinformation incidents. This team should be empowered to act quickly and coordinate messaging.

2. Develop a Disinformation Response Playbook

Create a documented plan that outlines how to identify, verify, and respond to disinformation. Include escalation protocols, communication templates, and roles for internal and external stakeholders.

3. Monitor Digital Channels

Use social listening tools and manual monitoring to track emerging narratives. Watch for impersonation, viral misinformation, and coordinated campaigns targeting your community.

4. Engage the Public Proactively

When disinformation arises, respond quickly with clear, factual messaging. Use trusted platforms—official websites, verified social media accounts, and community newsletters—to correct falsehoods and reinforce accurate information.

5. Train Staff and Officials

Educate employees and elected officials on how to recognize disinformation tactics and respond appropriately. Include this in cybersecurity and media training programs.

6. Promote Media Literacy

Support community education efforts that teach residents how to critically evaluate information. Partner with schools, libraries, and civic organizations to build long-term resilience.

7. Leverage Trusted Messengers

Work with local influencers, faith leaders, and community advocates to amplify accurate information and counter false narratives. These voices often carry more weight than official channels alone.


Disinformation is not just a communications issue—it’s a governance challenge. Local governments must treat it as a strategic risk, integrating response efforts into broader cybersecurity and public engagement strategies. By building proactive, coordinated defenses, municipalities can protect their communities, uphold public trust, and ensure that truth remains a cornerstone of civic life.

Categories
Leadership & Governance

Oversight in Action: Strengthening Cybersecurity Governance for Local Governments

The oversight of a cybersecurity program in a state or local government is a complex, multifaceted responsibility. With limited budgets, minimal staffing, and increasing regulatory demands, ensuring that cybersecurity programs are effective, efficient, and compliant can feel overwhelming. Yet, strong oversight is essential to protecting public assets, maintaining trust, and ensuring operational continuity.

Oversight doesn’t mean elected officials must manage every technical detail. Instead, staff should regularly report on key cybersecurity metrics and activities, enabling leadership to make informed decisions and allocate resources strategically.


Key Oversight Responsibilities

Effective oversight should focus on the following areas:

  • Program Assessment: Regularly evaluate the cybersecurity program’s effectiveness and alignment with organizational goals.
  • Risk Management: Identify and prioritize risks, and ensure mitigation strategies are in place.
  • Compliance Monitoring: Track adherence to applicable laws, regulations, and internal policies.
  • Incident Response Readiness: Review and test the incident response plan to ensure rapid containment and recovery.
  • Stakeholder Communication: Ensure a plan exists to communicate with internal and external stakeholders during and after an incident.
  • Training and Awareness: Confirm that employees receive ongoing cybersecurity education tailored to their roles.

Staffing and Expertise

A key success factor is hiring the right talent—cybersecurity professionals who can implement controls, monitor threats, and communicate risks clearly to leadership. Given the national cybersecurity talent shortage, many governments turn to third-party providers to fill technical gaps, offer independent oversight, and support interim needs.

Whether in-house or outsourced, cybersecurity oversight requires a blend of technical expertise and strategic insight.


Establishing a Cybersecurity Framework

A strong cybersecurity program begins with a well-defined framework. This sets the foundation for governance, risk management, and operational practices. Common frameworks include:

  • NIST Cybersecurity Framework (CSF): Focuses on five core functions—Identify, Protect, Detect, Respond, Recover.
  • CIS Controls: Offers 20 prioritized controls proven to reduce cyber risk.
  • ISO 27001: Provides a global standard for managing sensitive information.
  • COBIT: Focuses on IT governance and service delivery.
  • Cyber Resilience Review (CRR): A DHS-developed tool for assessing organizational resilience.

The choice of framework should reflect the agency’s size, complexity, and regulatory environment.


Conducting a Risk Assessment

Risk assessments help identify vulnerabilities and threats across systems, applications, and networks. Key steps include:

  1. Define scope and assets.
  2. Identify internal and external threats.
  3. Assess vulnerabilities.
  4. Analyze and prioritize risks.
  5. Develop and test mitigation plans.
  6. Review and update assessments regularly.

Cyber insurance should also be reviewed to ensure coverage for significant breaches.


Implementing Security Controls

Security controls are the technical backbone of any cybersecurity program. Implementation should follow a structured process:

  • Define and select controls.
  • Assess current environment.
  • Develop and execute an implementation plan.
  • Train staff on control usage.
  • Monitor, test, and update controls regularly.

Controls may include firewalls, intrusion detection systems, encryption, and access management tools.


Monitoring and Testing

Continuous monitoring and testing are essential to maintaining a strong security posture. Activities include:

  • Vulnerability scanning and penetration testing.
  • Phishing simulations and awareness training.
  • Incident response exercises.
  • Compliance audits and log reviews.

These efforts help detect threats early and validate the effectiveness of existing defenses.


Responding to Incidents

Even with strong defenses, incidents can occur. A well-defined incident response plan should include:

  • Preparation and role assignment.
  • Identification and containment.
  • Mitigation and recovery.
  • Reporting and stakeholder communication.
  • Post-incident analysis and improvement.

Regular testing ensures readiness and minimizes disruption during real events.


Training and Awareness

Cybersecurity is everyone’s responsibility. Training should be role-specific and ongoing. Examples include:

  • Phishing awareness and password hygiene.
  • Internet and remote access policies.
  • Incident reporting procedures.
  • Security awareness campaigns.

Regular updates and refreshers help maintain vigilance across the organization.


Oversight of a cybersecurity program requires more than technical know-how—it demands strategic planning, cross-functional coordination, and continuous improvement. By establishing a framework, conducting risk assessments, implementing controls, and fostering a culture of awareness, state and local governments can build resilient cybersecurity programs that protect public assets and serve their communities.

Categories
Actionable Steps Budgeting & Resources

Barriers & Gaps in Local Government Cybersecurity

Cybersecurity is no longer a niche concern—it’s a foundational element of public service delivery. Yet many local governments remain vulnerable to evolving threats due to persistent and interconnected barriers. These challenges—funding, staffing, leadership, and awareness—are often treated as separate issues, but in reality, they reinforce one another. Addressing them holistically is key to building resilient, secure communities.


Insufficient Funding

Limited budgets continue to be one of the most cited reasons municipalities lag in cybersecurity. In many cases, cybersecurity is still viewed as an optional add-on rather than a core infrastructure investment—like roads, water systems, or emergency services.

This mindset must change. Cybersecurity protects the digital infrastructure that underpins nearly every public function, from permitting and payroll to emergency alerts and public records. Without adequate funding, municipalities are forced to rely on outdated systems, under-resourced teams, and reactive strategies. Treating cybersecurity as infrastructure—and funding it accordingly—is essential to long-term resilience.


Workforce Shortages and Skills Gaps

The global shortage of cybersecurity professionals affects every sector, but local governments are especially hard-hit. They often struggle to compete with private-sector salaries and benefits, making it difficult to attract and retain qualified talent.

Beyond staffing numbers, there’s also a skills mismatch. Many existing employees lack the specialized training needed to respond to modern threats like ransomware, phishing, and cloud vulnerabilities. Upskilling staff is critical—but training budgets are often limited or nonexistent.

To address this, municipalities must invest in local talent development, create career pathways in cybersecurity, and explore regional partnerships to share expertise and resources.


Leadership Engagement and Misunderstandings

Cybersecurity is not just an IT problem—it’s a strategic leadership issue. Yet many local leaders still view it as something technical staff handle in isolation. This disconnect can lead to blind spots in governance, leaving agencies exposed to preventable risks.

When cybersecurity is underestimated, the consequences are severe: halted services, lost public trust, and costly recovery efforts. Embedding cybersecurity into executive decision-making—through regular briefings, cross-departmental coordination, and clear accountability—is essential.

Leaders must understand that cyber risk affects every aspect of public service, and their engagement is critical to building a culture of security.


Expanding Attack Surfaces

The shift to remote work, cloud-based tools, and mobile access has dramatically expanded the threat landscape. Traditional network boundaries no longer apply. Every laptop, smartphone, and remote login is now a potential entry point for attackers.

This decentralization makes it harder to monitor activity, enforce policies, and respond to incidents. Municipalities must rethink their security architecture to account for this new reality—implementing endpoint protection, multi-factor authentication, and continuous monitoring across all devices and platforms.


These barriers are not insurmountable—but they require coordinated, strategic action. When funding improves, staffing can follow. When leadership engages, awareness grows. When cybersecurity is treated as infrastructure, resilience becomes possible.

Local governments must move beyond reactive fixes and embrace a governance model that integrates cybersecurity into every decision. The risks are real—but so are the opportunities to build safer, smarter communities.