Transcript
A (0:01)
Hello and welcome to statescoop's Priorities podcast. I'm Colin Wood, statescoop's Editor in chief. This week I interviewed two officials from the nonprofit center for Internet Security about what's new with their organization after losing federal funding and what's ahead for state and local cyber in 2026. But first, here's what's happening in state and local IT. Former California Chief Information Officer Amy Tong has retired from state government. Tong, whose most recent role was as a senior counselor to Governor Gab Gavin Newsom, capped a 30 year career in public service. Tarek Tomes, Minnesota CIO, has also stepped down, accepting a role as CIO with the University of Minnesota. Tomes spent nearly seven years with the state government in Pennsylvania. CIO Brianna Pardo recently shared how her first months in the role have been going. After spending two years leading the state's digital services efforts, she said she wants to bring that experience to the CIO role. This week I interviewed Carlos Kazee, Senior Vice President of the center for Internet Security's Ms. ISAC Strategy and Plans, and John Cohen, Executive director of the CIS's Office of Strategic Programs and Initiatives. After losing federal funding, CIS last year switched to a paid membership model. Kazee explained why this change hasn't changed the nonprofit's mission.
B (1:23)
A lot is going on. A lot of our jurisdictions in the state, local, tribal and territorial community are adjusting to reduced funding. In some areas, increasingly sophisticated threats, both cyber and you know, all hazards. Things that are flowing from a bunch of different directions. I think that we're going through another cycle or another series of new normal in the state, local, tribal and territorial community and I'm just really proud of how our members in the community are adjusting to that and are really taking seriously what's been thrown at them and are doing the absolute best they can with the resources that they provide to protect their data, their networks, their systems and their citizens interests.
A (2:06)
What are you seeing? John?
C (2:08)
Yeah, to build on what Carlos is saying, what we're seeing is that foreign and domestic threat actors, whether it's foreign intelligence services, terrorist groups, violent extremists here at home, criminal organizations have fully embraced the power of the Internet and are regularly using emerging technologies, Internet based communication capabilities and even cyber attack and data exfiltration operations as a part of their day to day criminal activity. There's virtually no area of homeland security and or law enforcement that hasn't somehow been impacted by the fact that these threat actors are using these technological tools to when they're carrying out a broad range of threat related and criminal activity, whether it's human trafficking, drug smuggling, terrorist attacks, efforts to spy on our law enforcement or other governmental entities, they're all using the Internet. So what we've also seen is that, and I say this with love and affection to my profession, that law enforcement has been a little bit slow in adapting their investigative and threat mitigation activities accordingly. So one of the areas where we're working very closely with law enforcement, homeland security, emergency management, and CISOs across the country is to make them more aware of how the threat is involving, often at Internet speed, and make sure that they have the tools they need to combat the threat.
