The shifting cybersecurity mandate for states

Yuichiro Chino via Getty Images
COMMENTARY | Federal retrenchment means states must step up with funding and resources in a more complex environment. Multi-year federal funding can reduce some of those burdens.
Cybersecurity has long been one of the few issues to unite policymakers across party lines. No matter the political climate, protecting citizens, critical systems and digital infrastructure is a shared priority.
Yet as cyber risks grow more complex, the governance and funding structure behind them have become increasingly tenuous, creating uncertainty for the state and local leaders responsible for defending front-line systems. To keep pace with fast moving threats, states now need authority, resources, and tools to act quickly and consistently across their environments. That requires sustained, predictable funding that allows them to plan, build capacity and maintain readiness over time.
Over the past year, major federal funding shifts and strategic realignments have produced ripple effects that states are now being forced to absorb. The initial expiration of the Cybersecurity Information Sharing Act of 2015, which provided liability protections and privacy safeguards for sharing threat intelligence, along with the end of the State and Local Cybersecurity Grant Program on Oct. 1, 2025, represent another compounding challenge in how the nation approaches cyber readiness.
Congress began 2026 with bipartisan efforts to create more sustainable funding, with a short term approach to continue funding for the Technology Modernization Fund and explore pathways to extend the SLCGP and related information sharing funding resources. Short-term measures help, but they do not replace the need for multi-year appropriations that let states plan beyond annual federal cycles.
Government programs are foundational to cybersecurity across the country, and while their recent extensions provide relief, predictable multi-year support is essential to sustain information sharing and uplift under resourced communities. Without these protections and financial backstops, state and local governments face a choice: stand up their own frameworks, or assemble stopgaps that are often duplicative, fragmented and less coordinated, risking missed signals. In this environment, the old saying that you are only as strong as your weakest link has never been more true.
Meanwhile, leaders are navigating constrained budgets, compressed planning cycles, ongoing attacks and a growing transfer of responsibilities once shouldered by the federal government. For IT and security teams already stretched thin and juggling competing priorities, this is no small feat, especially as cyber threats become more sophisticated. Manual, labor intensive approaches are no longer sufficient, and smaller, resource constrained jurisdictions rely on more automated operations to keep pace. Government cyber teams must operate at the speed of modern threats. Federal funding changes reshape the operational, financial and strategic posture of public sector cybersecurity, making consistency more important than ever.
The policy question is straightforward, will we fund cyber as critical infrastructure with consistent, outcomes based investments, or will we continue to rely on episodic grants that force agencies to rebuild the basics every budget cycle.
A Cog in the National Cybersecurity Machine
States, cities and counties are more than administrative districts; they are critical nodes in the national cybersecurity ecosystem. Local governments, schools, utilities and public safety networks are often key targets for cyber threat actors, including nation‑state adversaries and sophisticated criminal groups.
Recent incidents in 2025, including coordinated ransomware attacks that disrupted courts and public safety services in Durant, Oklahoma, Lorain County, Ohio, and Puerto Rico’s Justice Department, along with continued targeting of K‑12 districts and universities nationwide, demonstrate how quickly local compromises can escalate into broader operational consequences.
These entities are frequently the point of entry and the first responders who translate national guidance into action on the ground. Because these front-line systems carry national consequences when compromised, steady funding for their defense is a national imperative, not just a local obligation.
Despite this, federal policy is moving toward a reduced central role. Reduced federal support and fee-based models create affordability gaps that limit access to threat intelligence and response capacity for smaller jurisdictions. Multi-year, predictable funding is the lever that ensures universal participation and keeps shared visibility intact across jurisdictions.
Without the information‑sharing community and its coordination mechanisms, threat intelligence quickly becomes uneven and varies dramatically by budget size. Readiness hinges on four elements: strong intelligence, automated detection, coordinated response, and a unified picture of risk. Targeting funding to these elements, with clear performance measures, translates directly into faster detection and remediation.
For instance, many potentially damaging incidents have been remediated before data theft or ransomware activation thanks to timely threat information shared by federal entities such as the Multi-State Information Sharing and Analysis Center, the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and other strategic partners. That intelligence was then passed to state-level incident response teams, which confirmed, mitigated and remediated the threats, reducing what could have been major cybersecurity incidents to brief maintenance activities. These outcomes depend on consistent funding for information sharing and response capacity across all jurisdictions.
With reduced federal support and uncertainty around key protections and grants, states are now expected to extend resilience to counties, local governments, schools and critical infrastructure while also building trust, visibility and sustainable funding models. This expansion of responsibility must be matched by reliable, multi-year resources, otherwise mandates outpace means and risk accumulates at the edges.
The Path Forward? A Shared Responsibility
Maryland’s vulnerability disclosure program is a useful model, and its core lesson is practical, continuous discovery and remediation only work when funding is consistent. States can tailor approaches, but sustained investment is the decisive factor in resilience, not one off pilots.
Some states have larger economies, and thus larger budgets to fund intelligence sharing models and whole of state cyber operations without federal involvement. Not all states have that luxury. Without state to state coordination and ideally federal governance, the result could be a patchwork of uneven protections, where wealthier states develop robust programs while others lag.
Cyber adversaries only need one weak entry point, and fragmentation becomes a strategic risk. This is why congressional efforts to reauthorize and stabilize state cybersecurity funding are so important, since volatility undermines readiness while predictable support enables planning, workforce development and measurable outcomes.
A durable model pairs a federal baseline with state matching, delivers multi-year appropriations, and ties funding to simple outcome metrics such as mean time to detect, mean time to remediate and percentage of assets covered.
The ideal path forward is a broader program funded by each state, supported by a dedicated federal cyber program scaled to state size and available resource capacity, with aligned federal and state interoperable governance and interoperability standards. This model aligns with how energy, transportation and public health are managed, and cybersecurity should be no different. Shared services, pooled procurement and common platforms reduce total cost of ownership for smaller jurisdictions, and sustained funding allows them to participate on equal footing.
Such a model would include baseline federal guidelines and interoperability standards building upon the MS-ISAC interoperability model for vulnerability disclosure programs, intelligence sharing and reporting, and a unified national clearinghouse for anonymized threat intelligence, ensuring that all states, regardless of means, benefit from collective insights and ensure successful remediation, harnessing the power of intelligent automation with the confidence to patch critical systems autonomously. Shared services models, like those used for emergency management or election security, would ensure equitable access. Policy should also incentivize cross-sector sharing, reward measurable interstate and local collaboration and align public-private playbooks for response, remediation and ultimately risk reduction from the smallest of US governments to the largest.
Although such a model would require bipartisan cooperation and resources to coordinate across all government levels, this is not a matter of political standing or economic advantage. It’s not about big government or small government. It’s about smart government and recognizing that cybersecurity is now a form of national defense across all levels of government and critical infrastructure. Offense succeeds only when the entire ecosystem, federal, state, local and private, is prepared, connected and operating from a common picture of mission and risk.
A Moment of Reckoning and Opportunity
The cybersecurity mandate for government is shifting quickly and decisively. While current cuts and the ongoing threat of expiration of federal protections and funding present immediate challenges, they create a long-overdue inflection point for cyber security modernization.
States now have an opportunity to build modern, data-driven cyber programs, strengthen collaboration across state lines, and advance a new federal-state partnership model that is more agile and equitable. This is the moment to lock in multi-year, outcomes-based funding that professionalizes cyber security across all levels of government, stabilizes the workforce and standardizes capabilities at scale.
But this must happen with urgency. Cybersecurity is only as strong as its weakest link, and under-resourced state and local environments must be uplifted to close critical gaps.
If we fail to collaborate across all levels of government and the public and private sectors, the nation’s cyber resilience will face greater risk of outages, data theft and potentially life threatening disruptions. Conversely, if we embrace shared responsibility, modern governance and equitable funding models, we can strengthen cyber defenses for every community, not just those with the largest budgets.
We need to treat cybersecurity as the critical infrastructure it is, and fund it for the long term, because the safety of every community depends on it.
Claire Bailey is public sector CIO at Tanium.




