Categories
Actionable Steps

What Good Cybersecurity Looks Like for Local Governments

In today’s digital landscape, cybersecurity is not just a technical safeguard—it’s a cornerstone of public trust and operational continuity. For local governments, good cybersecurity means more than installing antivirus software or responding to threats as they arise. It’s about creating a proactive, strategic, and resilient approach that protects public services, sensitive data, and community confidence.

Municipalities face unique challenges: limited budgets, legacy systems, and growing digital demands. Yet, with the right governance and mindset, they can build cybersecurity programs that are not only effective but sustainable. So, what does “good cybersecurity” actually look like in practice?

1. Risk-Driven Decision Making

Effective cybersecurity begins with understanding risk. Local governments must identify their most critical assets—emergency services, financial systems, citizen data—and prioritize protections based on threat likelihood and impact. This means moving beyond generic checklists and tailoring strategies to the specific risks facing each department and service.

2. Adaptive and Responsive Systems

Cyber threats evolve quickly. Good cybersecurity programs are flexible enough to respond to new vulnerabilities, emerging technologies, and changing operational needs. This includes regularly updating policies, patching systems, and adjusting access controls to reflect current realities.

3. Proactive Prevention

Prevention is always more cost-effective than recovery. Strong cybersecurity programs focus on stopping incidents before they happen—through layered defenses, continuous monitoring, and employee training. This includes phishing simulations, endpoint protection, and network segmentation to reduce the blast radius of any potential breach.

4. Clear Roles and Shared Responsibility

Cybersecurity is a shared responsibility. From elected officials to frontline staff, everyone plays a role. Good programs define responsibilities clearly—whether through a dedicated cybersecurity officer, cross-departmental governance committees, or vendor oversight. This clarity ensures accountability and reduces gaps in coverage.

5. Measurable Performance

You can’t improve what you don’t measure. Good cybersecurity includes metrics for performance—such as incident response times, patching rates, and training completion. These indicators help leaders monitor progress, identify weaknesses, and make informed decisions about resource allocation.

6. Collaboration and Communication

Local governments don’t operate in isolation. Good cybersecurity involves sharing threat intelligence with regional partners, state agencies, and trusted networks. It also means communicating clearly with the public—especially in the event of a breach—to maintain transparency and trust.

7. Continuous Learning and Awareness

Cybersecurity is not a one-time fix—it’s an ongoing process. Good programs invest in continuous education for both technical staff and decision-makers. This includes staying current on best practices, participating in training, and fostering a culture of vigilance across departments.

Why It Matters

When cybersecurity is strong, local governments can:

  • Deliver uninterrupted public services.
  • Protect sensitive data from misuse.
  • Avoid costly breaches and reputational damage.
  • Build public confidence in digital systems.

Ultimately, good cybersecurity is not just about technology—it’s about leadership, strategy, and community resilience.

Categories
Actionable Steps Budgeting & Resources

Barriers & Gaps in Local Government Cybersecurity

Cybersecurity is no longer a niche concern—it’s a foundational element of public service delivery. Yet many local governments remain vulnerable to evolving threats due to persistent and interconnected barriers. These challenges—funding, staffing, leadership, and awareness—are often treated as separate issues, but in reality, they reinforce one another. Addressing them holistically is key to building resilient, secure communities.


Insufficient Funding

Limited budgets continue to be one of the most cited reasons municipalities lag in cybersecurity. In many cases, cybersecurity is still viewed as an optional add-on rather than a core infrastructure investment—like roads, water systems, or emergency services.

This mindset must change. Cybersecurity protects the digital infrastructure that underpins nearly every public function, from permitting and payroll to emergency alerts and public records. Without adequate funding, municipalities are forced to rely on outdated systems, under-resourced teams, and reactive strategies. Treating cybersecurity as infrastructure—and funding it accordingly—is essential to long-term resilience.


Workforce Shortages and Skills Gaps

The global shortage of cybersecurity professionals affects every sector, but local governments are especially hard-hit. They often struggle to compete with private-sector salaries and benefits, making it difficult to attract and retain qualified talent.

Beyond staffing numbers, there’s also a skills mismatch. Many existing employees lack the specialized training needed to respond to modern threats like ransomware, phishing, and cloud vulnerabilities. Upskilling staff is critical—but training budgets are often limited or nonexistent.

To address this, municipalities must invest in local talent development, create career pathways in cybersecurity, and explore regional partnerships to share expertise and resources.


Leadership Engagement and Misunderstandings

Cybersecurity is not just an IT problem—it’s a strategic leadership issue. Yet many local leaders still view it as something technical staff handle in isolation. This disconnect can lead to blind spots in governance, leaving agencies exposed to preventable risks.

When cybersecurity is underestimated, the consequences are severe: halted services, lost public trust, and costly recovery efforts. Embedding cybersecurity into executive decision-making—through regular briefings, cross-departmental coordination, and clear accountability—is essential.

Leaders must understand that cyber risk affects every aspect of public service, and their engagement is critical to building a culture of security.


Expanding Attack Surfaces

The shift to remote work, cloud-based tools, and mobile access has dramatically expanded the threat landscape. Traditional network boundaries no longer apply. Every laptop, smartphone, and remote login is now a potential entry point for attackers.

This decentralization makes it harder to monitor activity, enforce policies, and respond to incidents. Municipalities must rethink their security architecture to account for this new reality—implementing endpoint protection, multi-factor authentication, and continuous monitoring across all devices and platforms.


These barriers are not insurmountable—but they require coordinated, strategic action. When funding improves, staffing can follow. When leadership engages, awareness grows. When cybersecurity is treated as infrastructure, resilience becomes possible.

Local governments must move beyond reactive fixes and embrace a governance model that integrates cybersecurity into every decision. The risks are real—but so are the opportunities to build safer, smarter communities.

Categories
Planning & Policy

Defining and Structuring IT and Cybersecurity Roles for Local Governments

As local governments modernize their operations and expand digital services, the need for clear, well-structured roles in IT and cybersecurity has never been more urgent. From online permitting platforms to cloud-based data systems, municipalities are increasingly reliant on technology to deliver public services. But with this reliance comes risk—and the responsibility to manage it effectively.

One of the most important steps in building cyber resilience is clarifying the distinction between IT and cybersecurity functions. While these domains are closely related, they serve fundamentally different purposes and must be structured accordingly.

Why Role Clarity Matters

Strong governance depends on clear role definitions. When IT and cybersecurity responsibilities are blurred, security can be compromised by operational urgency or budget constraints. For example, if a city launches a new online permitting system, the IT team may focus on uptime and user experience, while cybersecurity professionals ensure that sensitive resident data is encrypted, access is controlled, and third-party risks are assessed.

This separation allows cybersecurity teams to assess risk independently and advocate for protections that may not align with short-term operational goals—but are essential for long-term resilience.

Structuring Roles: A Governance-Aligned Approach

The Enterprise Governance of Information and Technology (EGIT) framework provides a model for structuring IT and cybersecurity roles in a way that supports strategic alignment and risk-informed decision-making.

1. Functional Separation

  • IT Departments: Focus on deploying and maintaining technology systems that support operations.
  • Cybersecurity Teams: Focus on protecting data, systems, and infrastructure from threats.

This separation ensures that cybersecurity professionals can operate without being subordinated to project timelines or budget pressures.

2. Leadership Accountability

Cybersecurity is not just a technical issue—it’s a leadership responsibility. Elected officials, department heads, and senior executives must recognize that cyber risk affects their ability to deliver services and maintain public trust.

3. Defined Responsibilities Across Roles

Every employee in local government has a role in cybersecurity—from locking devices and reporting suspicious activity to completing training and following data protection protocols.


Examples of Role Definitions

RolePrimary FocusKey Responsibilities
IT DirectorOperational technologySystem uptime, software deployment, vendor management
Cybersecurity OfficerRisk managementThreat detection, incident response, policy enforcement
Department HeadsStrategic oversightAligning tech use with service goals, ensuring compliance
Frontline StaffDaily operationsFollowing security protocols, reporting incidents

Local governments must build governance structures that support both innovation and protection. By clearly defining and separating IT and cybersecurity roles, municipalities can:

  • Make unbiased, risk-informed decisions.
  • Respond more effectively to threats.
  • Build a culture of cybersecurity across all departments.
Categories
Leadership & Governance Tools & Guidance

Cybersecurity Questions for Decision-Makers: A Checklist for Smarter Governance

In today’s digital-first environment, local government leaders face complex decisions that impact everything from service delivery to public trust. Whether evaluating new technologies, managing vendor relationships, or allocating budgets, cybersecurity must be part of the conversation—not an afterthought.

The Enterprise Governance of Information and Technology (EGIT) framework offers a structured approach to integrating cybersecurity into decision-making. It empowers officials to ask the right questions, weigh trade-offs, and make informed choices that balance innovation with risk.

To support this shift, we’ve developed a Cybersecurity Questions for Decision-Makers Checklist—a practical tool for embedding security into governance processes.


Cybersecurity Questions for Decision-Makers

Use this checklist to guide discussions and ensure cybersecurity is considered at every stage of planning and implementation:

1. Strategic Alignment

  • Does this technology investment align with our mission and service goals?
  • How does it support resilience, transparency, and public trust?

2. Risk Oversight

  • What are the cybersecurity risks associated with this decision?
  • Have we consulted cybersecurity leaders or risk specialists?
  • Are we considering both internal and third-party risks?

3. Compliance and Legal Obligations

  • Does this solution meet our legal and regulatory requirements (e.g., CJIS, HIPAA)?
  • How will we ensure ongoing compliance as regulations evolve?

4. Data Protection and Privacy

  • What types of data are involved, and how will they be protected?
  • Are encryption, access controls, and monitoring in place?

5. Roles and Responsibilities

  • Who is accountable for cybersecurity in this initiative?
  • Are roles clearly defined across departments and vendors?

6. Incident Preparedness

  • Do we have a response plan if something goes wrong?
  • How will we detect, respond to, and recover from a cyber incident?

7. Budget and Resources

  • Have we allocated sufficient resources for cybersecurity?
  • Are we balancing operational needs with long-term risk management?

8. Performance and Monitoring

  • What metrics will we use to monitor cybersecurity performance?
  • How often will we review and update our approach?

9. Public Communication

  • How will we communicate cybersecurity risks and protections to the public?
  • Are we prepared to maintain trust in the event of a breach?

Cybersecurity is no longer just an IT issue—it’s a governance imperative. By using this checklist, local officials can ensure that cybersecurity is part of every major decision, from budgeting and procurement to service delivery and public engagement. These questions help leaders move from reactive risk management to proactive resilience.

Categories
Leadership & Governance

Applying EGIT Principles to Local Government Governance Models

As local governments embrace digital transformation, they face a dual challenge: delivering efficient, citizen-centered services while managing the growing risks of operating in a digital-first environment. One essential model for supporting this shift is the Enterprise Governance of Information and Technology (EGIT) framework. EGIT enables municipalities to align technology investments and digital service delivery with broader goals such as resilience, transparency, and public trust 

At its core, EGIT emphasizes two interdependent responsibilities:

  • Delivering value to the public through the effective use of data and digital tools.
  • Managing risk, including cybersecurity, as an integral part of governance.

To operationalize these principles, local governments can explore example governance models that support strategic alignment across departments.


Model 1: Risk-Informed Leadership Structure

This model integrates EGIT by embedding cybersecurity and digital risk into executive decision-making. Department heads and elected officials receive regular briefings on technology risks, and cybersecurity leaders participate in strategic planning sessions.

EGIT Application:

  • Risk is treated as a governance issue, not just a technical one.
  • Technology decisions are evaluated for both service impact and risk exposure.
  • Cybersecurity leaders have a seat at the table, ensuring independent risk assessments.

Model 2: Functional Separation of IT and Cybersecurity

EGIT calls for a clear distinction between IT operations and cybersecurity oversight. In this model, IT teams focus on service delivery and infrastructure, while cybersecurity teams independently assess threats, monitor compliance, and guide risk mitigation.

EGIT Application:

  • Prevents operational demands from compromising security.
  • Enables unbiased risk reporting and prioritization.
  • Supports resilience by ensuring that security is not subordinated to convenience or cost.

Model 3: Departmental Alignment Through Governance Councils

This model establishes a cross-functional governance council that includes representatives from IT, cybersecurity, finance, legal, and public services. The council reviews technology initiatives, evaluates risk, and ensures alignment with strategic goals.

EGIT Application:

  • Promotes transparency and shared accountability.
  • Aligns digital investments with community priorities.
  • Facilitates coordinated responses to emerging threats.

Model 4: Citizen-Centric Digital Service Oversight

EGIT emphasizes delivering public value. This model focuses on measuring the impact of digital services—such as online permitting, emergency alerts, and citizen portals—against metrics like accessibility, equity, and trust.

EGIT Application:

  • Uses data to evaluate service performance and user satisfaction.
  • Ensures that digital tools enhance—not hinder—public engagement.
  • Balances innovation with privacy and security protections.

EGIT is more than a framework—it’s a mindset. By applying EGIT principles to governance models, local governments can build structures that support innovation while safeguarding public assets. Whether through leadership integration, functional separation, or cross-departmental alignment, EGIT helps municipalities navigate the complexities of digital transformation with confidence and clarity.

Categories
Cybersecurity Basics

Why Hackers Hack: Understanding Cyber Threat Motivations

Cyberattacks are not random acts of digital vandalism—they are calculated, purposeful, and often deeply strategic. To effectively defend against these threats, local governments must understand not just how hackers operate, but why they do it. The motivations behind cyberattacks are as diverse as the actors themselves, ranging from financial greed to ideological warfare.

Why Motivation Matters

To build stronger defenses, local government leaders must not only know who is behind cyber incidents, but also why they occur:

  • Prioritize defenses based on threat likelihood.
  • Identify high-risk assets and systems.
  • Tailor incident response plans to attacker profiles.
  • Improve staff awareness and training.

Motivations Behind Cyber Threats

MotivationActorsWhat They DoExamples
Financial GainOrganized Crime, Cybercriminals, InsidersExtort money, steal data for resale, manipulate systems for profitRansomware (REvil, Conti), BEC scams, data breaches, cryptojacking
Political ActivismHacktivists, Nation-StatesTarget governments or corporations to advance political agendasWebsite defacement, leaks tied to causes (e.g., Flint water crisis, Ukraine conflict)
EspionageNation-States, Insiders, Foreign Intelligence ServicesSteal sensitive data or intellectual property for strategic advantageAPT10 targeting defense contractors, research theft
Terrorism & DisruptionCyber Terrorists, Nation-StatesAttack infrastructure to cause fear or instabilityPower grid sabotage, water system disruption
Ideological MotiveHacktivists, InsidersAttack perceived enemies of their beliefsData leaks targeting anti-abortion groups or political dissenters
Mischief & Thrill-SeekingScript KiddiesLaunch attacks for fun, curiosity, or recognitionDDoS attacks, website defacement, bragging rights
Retaliation & GrudgeInsiders, HacktivistsSeek revenge against organizations or individualsDisgruntled employees leaking data or sabotaging systems
Social ChangeHacktivistsPromote civil disobedience or social justiceAttacks tied to BLM, environmental protests, anti-censorship

Implications for Local Governments

Understanding the motivations behind cyberattacks is not just an academic exercise—it’s a practical necessity for local government leaders. Each motivation corresponds to different tactics, targets, and levels of sophistication. For example:

  • Financially motivated attackers may exploit vulnerabilities in payment systems, tax databases, or procurement platforms.
  • Politically motivated actors might target law enforcement, election systems, or public health departments to make a statement or disrupt operations.
  • Insiders with grievances could misuse access to leak sensitive data or sabotage systems from within.

This diversity in threat profiles means that a one-size-fits-all approach to cybersecurity is insufficient. Local governments must tailor their defenses to the specific risks they face, based on the motivations most likely to target their operations.

Turning Insight into Action

To effectively counter these threats, municipalities should adopt a motivation-aware cybersecurity strategy. Here are key steps to consider:

1. Threat Modeling Based on Motivation

Map out which motivations are most relevant to your organization. For example, if your agency handles sensitive personal data, financial gain and espionage may be top concerns. If your work intersects with controversial public policies, ideological motives and hacktivism may be more likely.

2. Layered Defense Architecture

Implement multiple layers of security controls—technical, administrative, and physical—to protect against both external and internal threats. This includes firewalls, endpoint protection, access controls, and data encryption.

3. Insider Risk Management

Develop policies and monitoring systems to detect and prevent insider threats. This includes background checks, access reviews, and behavioral analytics to identify anomalies.

4. Staff Training and Awareness

Educate employees on the tactics used by different threat actors. Tailored training can help staff recognize phishing attempts, social engineering, and suspicious behavior.

5. Incident Response Planning

Prepare for different types of attacks by creating scenario-based response plans. A ransomware attack requires a different response than a politically motivated data leak or a DDoS attack launched for mischief.

Cybersecurity is not just about technology—it’s about understanding human intent. By recognizing the motivations behind cyberattacks, local governments can build smarter, more resilient defenses that protect public trust and ensure continuity of services.

Categories
Cybersecurity Basics

Know Your Enemy: The 8 Types of Cyber Threat Actors

Cybersecurity is no longer a niche concern—it’s a frontline issue for local governments. From ransomware attacks that paralyze public services to data breaches that expose sensitive resident information, the threat landscape is growing more complex and dangerous. At the heart of this digital battleground are the cyber threat actors, often referred to as “bad actors.” These individuals or groups exploit technology to conduct malicious activities such as hacking, phishing, and malware deployment.

Bad Actors vs. Defenders: The Asymmetry of Cyber Conflict

The economic dynamics of cybersecurity are starkly imbalanced. Attackers only need to succeed once, while defenders must be flawless every time. This asymmetry creates a daunting challenge for local government cybersecurity teams.

  • Low Cost of Entry for Attackers: The barrier to entry for launching cyberattacks has never been lower. On the dark web, malicious tools and services are readily available for purchase or rent. For example:
    • Ransomware-as-a-Service (RaaS) platforms allow even non-technical criminals to deploy sophisticated attacks.
    • Phishing kits with pre-built templates and spoofing tools can be bought for under $50.
    • DDoS-for-hire services can be used to overwhelm public websites or internal systems for as little as $200.
  • High Cost for Defenders: In contrast, defenders must secure every endpoint, every user, and every system—24/7. Even a single overlooked vulnerability can lead to catastrophic consequences. For local governments, this means:
    • Maintaining up-to-date patches across legacy systems that may not be easily upgradeable.
    • Training staff to recognize and report phishing attempts, despite high turnover or limited cybersecurity awareness.
    • Monitoring networks for anomalies, often without a dedicated security operations center (SOC).
    • Complying with regulations and reporting requirements, which add administrative overhead.

This uneven playing field means attackers can afford to be opportunistic, while defenders must maintain constant vigilance.

The Imbalance in Risk and Reward

This asymmetry creates a risk-reward imbalance:

AspectAttackersDefenders
CostLow (tools are cheap or free)High (tools, staff, training, compliance)
EffortOne successful exploit is enoughMust defend all vectors, all the time
RiskOften anonymous, low legal riskHigh accountability, legal and reputational consequences
ScaleCan automate and replicate attacksMust tailor defenses to each system and user

For defenders, the cost of failure is steep:

  • Financial Losses: Ransom payments, recovery costs, and lost revenue.
  • Reputational Damage: Loss of public trust, especially if resident data is compromised.
  • Operational Disruption: Downtime in essential services like emergency response, utilities, or public records.
  • Legal and Regulatory Penalties: Non-compliance with data protection laws can result in fines and audits.

Types of Cyber Threat Actors

Understanding the motivations, capabilities, and tactics of cyber threat actors is essential for building resilient defenses—especially for local governments that manage sensitive data and critical infrastructure. These actors vary widely in sophistication, intent, and impact, but each poses a unique risk to public sector organizations.

Type of ActorWho They AreWhat They DoMotivation
Nation-StatesGovernment-backed groups with extensive resources and strategic objectives.Launch Advanced Persistent Threats (APTs), conduct espionage, disrupt infrastructure, and manipulate political systems.Espionage, geopolitical advantage, economic disruption.
Organized CrimeSophisticated criminal syndicates operating like businesses.Deploy ransomware, steal data, commit fraud, and sell stolen credentials.Financial gain through extortion, blackmail, and identity theft.
HacktivistsIdeologically driven individuals or groups.Deface websites, leak sensitive data, disrupt services to promote causes.Political activism, social justice, retaliation.
InsidersEmployees, contractors, or vendors with privileged access.Leak data, sabotage systems, or unintentionally expose vulnerabilities.Grievance, financial reward, coercion, or ideological alignment.
Script KiddiesInexperienced individuals using pre-made tools.Launch DDoS attacks, deface websites, or breach systems for fun.Recognition, boredom, curiosity.
Cyber TerroristsExtremist groups seeking to cause fear and disruption.Target critical infrastructure, emergency services, and communication networks.Ideological warfare, political destabilization.
Foreign Intelligence ServicesState-sponsored espionage units.Steal sensitive data, conduct influence operations, and manipulate public opinion.National security, economic advantage, political leverage.
Terrorist OrganizationsRadical groups using cyber tactics as part of broader warfare.Attack infrastructure, disrupt governance, and spread propaganda.Retaliation, ideological extremism, destabilization.

Each actor type presents unique risks, and their tactics evolve constantly. Defenders must understand the Tactics, Techniques, and Procedures (TTPs) used by adversaries to stay ahead.

What Local Government Leaders Can Do

To counter this imbalance, local government must:

  • Prioritize cybersecurity as a strategic risk, not just an IT issue.
  • Invest in layered defenses, including endpoint protection, network segmentation, and incident response planning.
  • Foster a culture of security awareness across all departments.
  • Leverage partnerships with state and federal cybersecurity agencies for threat intelligence and support.