Here’s Why State-Level Cybersecurity Practices Matter
When the call came in from New Jersey鈥檚 Homeland Security Advisor, Dave Weinstein was exhausted. He鈥檇 been working as consultant for just over a year, advising companies on cyber risk, and though he found the work stimulating, taking four flights a week was draining. So, when one of his mentors asked if he would come on board to build the cyber program in New Jersey, he didn鈥檛 hesitate, thinking it would be a short-term position.
He was right, but not in the way he thought.
At 22, Weinstein was spending most of his days in the basement of the National Security Agency headquarters at Fort Meade. Just out of school, he scored a position as a cyber operations planner with U.S. Cyber Command. 鈥淚 loved it! Though I didn鈥檛 see a lot of sunlight for about three and a half years.鈥 Working alongside older military members鈥攎any of whom were fresh off the battlefield from Afghanistan and Iraq鈥攈e got his hands dirty with contingency planning in defense of critical infrastructure, and rose quickly through the civilian ranks. Those were the 鈥渧ery early days of combining offensive and defensive operations into military doctrine,鈥 which meant sitting with a number of 鈥渧ery prickly and undefined policy challenges.鈥 As it turns out, this kind of thinking in a fast-paced environment would be excellent practice for what was to come.
There are fewer and fewer people who don鈥檛 realize, at least on some level, that our rapidly evolving technological ecosystem also brings previously unimaginable threats. Someone who sheepishly admits to being hopeless on cybersecurity probably () believes that they鈥檙e only putting themselves, and not others, at risk. Governments, on the other hand, hold protecting others as core to their mission, and state governments are no exception.
Weinstein arrived to serve as New Jersey鈥檚 first cybersecurity advisor in August of 2014. After a few briefings, he quickly realized that there was a lot to do. The first item on his agenda was to build threat awareness in New Jersey. In the cybersecurity world, this is known as 鈥渋nformation sharing.鈥 The basic idea is that spreading information to people about what malicious actors are doing in cyberspace, and how they are doing it, can help people protect themselves, especially if the information is timely and specific. Imagine you got a notice that someone was breaking into houses on your street through unlocked upstairs windows, and that they lingered on targets鈥 front porches for days before striking, smacking and then spitting out bubblegum. If you arrived home one day to the unmistakable scent of watermelon bubblegum, you might rush to lock your upstairs windows. Very roughly, the cyber threat intelligence version of this is called IOC, or indicators of compromise. While they do not ordinarily involve bubblegum, they can be very specific, involving clues like IP addresses and domain names. (How much of, and in what form, this kind of information should be shared is a topic of vigorous debate.)
Several organizations share this sort of information, as well as help entities respond to cyber incidents, within, across, and. The federal government鈥檚 version is called the National Cybersecurity and Communications Integration Center (or the much snappier acronym, 鈥楴CCIC鈥, pronounced N-Kick). When Weinstein got to New Jersey, he saw they needed an entity that would share this kind of information to specifically serve the New Jersey community鈥攆or IT practitioners and users within state government, but especially for critical infrastructure providers and small businesses across the state. According to Weinstein, those last two groups were especially underserved in this respect鈥攏ot because the feds weren鈥檛 trying, but because the feds couldn鈥檛 possibly scale that kind of service down to the state and local level. To fill the institutional gap, Weinstein and his team built up. The first of its kind in the nation, NJCCIC is modeled off the federal government鈥檚 version, and serves as a hub for cybersecurity information sharing, incident reporting, and threat analysis.
It should be noted that a David Weinstein is not an easy find. On some level, successful cybersecurity policy depends on filling key cybersecurity roles. The within the broader cybersecurity workforce is especially pronounced when it comes to state and local governments, where similar demands for talent overlaps with lower compensation than what the private sector can offer. In a 2015 of State Chief Information Officers, 92 percent of states reported that salaries and pay structures were an obstacle to attracting and retaining IT talent, and 86 percent of states struggled to recruit new employees to fill vacant IT positions.
The challenge extends also to the leadership level, where the for a State Chief Information Officer is just over two years鈥攁bout half the length of a private sector equivalent. New Jersey鈥檚 previous CIO served for twice as long as most. When he stepped down after five years, Governor Chris Christie saw an opportunity to do what he鈥檇 hoped to do for a while: elevate the position to the cabinet level. In June of 2016, Christie the role of Chief Technology Officer, emphasizing how critical IT and security are to the state. He also knew exactly whom to tap for this new role.
Today, as a cabinet member and head of all things information technology in the state of New Jersey, Weinstein鈥檚 responsibilities are only growing. Earlier this month, Governor Chris Christie signed an that gives the agency Weinstein heads the statutory authority and bureaucratic clout to fully execute its mission.
When I asked Weinstein, given his background at the federal level, how he thought states fit into in the national cybersecurity picture, he emphasized that since states hold far more of their citizens鈥 information than does the federal government, it鈥檚 imperative that they have state-of-the-art cybersecurity practices.
But, states are also uniquely positioned to contribute to cybersecurity because they are 鈥渕ore intimately connected to their citizens.鈥 Speaking of small businesses in New Jersey, Weinstein says that while the federal government can鈥檛 focus its resources on making sure small businesses are, for example, getting the latest vulnerability advisories for their sector, 鈥渨e [in New Jersey] know our small businesses. We know the heads of the local chambers. We have those relationships.鈥 As most cybersecurity practitioners will tell you, this work is far more about relationships than it might first appear. Beyond the technical elements, the central dynamic is people helping other people, and people helping others to better help them. As Weinstein puts it, state and local governments have the privilege and benefit of 鈥渓iving and operating in the communities you鈥檙e trying to protect.鈥 In that light, it鈥檚 hard to imagine who is better positioned to help.