fingers typing on a keyboard with security icons overlayed

Protect Yourself Online

​​​​The State of Wisconsin's Mission is to Protect the State of Wisconsin and its citizens from an array of Cybers​ecurity Threats and ​has gathered the following information for you to be safe online.



Cybersecurity Protection Goal: Establish an information security operation that embodies national excellence and protects our data.

  • ​​Governor's Cyber Summit:​ This annual summit brings together national cybersecurity experts, government and academic leaders and the business community to share knowledge and experience in finding new ways to protect our digital infrastructure and address the emerging challenges of cybersecurity​​.

  • Women in Cybersecurity:​ Is an annual event held in conjunction with the Governor’s Cybersecurity Summit. The event focuses on the growing and evolving opportunities for women in the cybersecurity field. It brings professionals together from the public and private sectors, who are leaders and innovators, to discuss important topics in the field.
  • InfraGard WISCONSIN: P​artnership between the U.S. Federal Bureau of Investigation (FBI) and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence​​ to prevent hostile acts against the U.S.

  • Multi State Information Sharing and Analysis Center​ (MS-ISAC): As a trusted cybersecurity partner for U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, MS-ISAC cultivates a collaborative environment for information sharing in support of our mission. They offer members incident response and remediation support through thier team of security experts and develop tactical, strategic, and operational intelligence, and advisories that offer actionable information for improving cyber maturity.​
  • US-CERT General Tips and Publications: CISA has documents that can help you with everything from setting up your first computer to understanding the nuances of emerging threats.

  • CIS Critical Security Controls: Has a prioritized set of actions to protect your organization and data from cyber-attack vectors.​​​

  • National Cybersecurity Strategy​: The strategy positions the United States and its allies and partners to build a digital ecosystem together, making it more easily and inherently defensible, resilient, and aligned to benefit us all​.


Cybersecurity Response​ Goal: Establish statewide processes, procedures, and practice incident
responsiveness that can reply and support cybersecurity incidents across the state.

  • Cyber Resp​onse Teams (CRT):​ The Cyber Response Teams strive for a safer, stronger enviro​nment for users by responding to major incidents, analyzing threats, and exchanging critical cybersecurity information with trusted partners. It is a never-ending battle with malicious actors but working with different teams and people, like you, only increases our chances of success.

  • ​​ReadyWisconsin has a resource website that has tips for Protecting yourself, before, during, and after a cyberattack.

  • Report an ​Incident​ contacts for State Agencies, Local Government, Tribes, School Districts, and Private Industry. (See Flow Chart below)

Cybersecurity Education Goal: Build an integrated ecosystem of cybersecurity education across the State to address the continued shortage of cybersecurity professionals in Wisconsin. This would include preparing administrators and teachers of cybersecurity, providing and supporting opportunities for those interested in cybersecurity, and creating a more cybersecurity aware next generation in Wisconsin. 

  • ​Department of Homeland Security (DHS): Federal agency who’s mission it is to secure the nation from the many threats that we face. They have information, free services, etc. that everyone in the state can find helpful.

  • Office of Cybersecurity - UW–⁠Madison Information Technology: UW Madison cybersecurity resources. ​

  • Cyber Education:​ ​Cyber professionals are in great demand in the State of Wisconsin. Find resources on how you can pursue a career path in the cybersecurity field.​

  • Skills for All Catalog: from Cisco Networking Academy gives learners everywhere a pathway to a career in tech. Skills ​for All provides free, quality, self-paced online learning aligned to industry jobs and connects learners to in-demand entry-level IT jobs, industry certifications, and valuable career resources.​​Cybersecurity Pathway: the following courses that are prepare for the State of Wisconsin for the IT Specialist-Cybersecurity Certification are: Introduction to Cybersecurity; Networking Essentials; Endpoint Security; Network Defense; Cyber Threat Management; Intro to IoT; Exploring IoT; Networking Basics; Cybersecurity Essentials; Networking Devices & Initial Configuration; Python Essentials; and the Cybersecurity Pathway Exam. The entire program can be found here​.  

Cybersecurity Compliance Goal: Promote organizational adherence to applicable federal and state security requirements and laws.

  • DOA Treasury Services - PCI Compliance:​ State of Wisconsin forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.​

  • Program Audits | CMS: ​Partners who have systems with medical information should be aware of the Centers for Medicare & Medicaid Services (CMS) security requirements and audits.  Connect to all of CMS resources to find out more.
  • Critical Infrastructure Sectors | CISA: There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Learn all about the sectors and requirements.

compliance checkmark icon
Engage and Transform 

Cybersecurity Engage and Transform Goal: Promote and lead digital transformations that encourage change, agility, speed, connectivity, and the introduction of new processes and technologies. ​Utilizing cyber​security as an enabler and positive discriminator for business and operations.

  • .gov domains are available at no cost to qualifying U.S.-based government organizations.​ CISA, the Cybersecurity and Infrastructure Security Agency, sponsors the .gov top-level domain at the federal level​.​

  • DET Cloud Brokerage ( Connecting to the cloud is an exciting opportunity for many organizations these days. DET has valuable security information and tools that you might find helpful as you embark on your own cloud journeys.
  • There are several grant opportunities that become available throughout the year from the federal government. Many of those grants have requirements, information, and deadlines that can assist with programs and projects you are asked to support.

  • State and Local Grant Programs:​ ​The Infrastructure Investment and Jobs Act (IIJA)​ established grant funding through the State and Local Cybersecurity Grant Program (SLCGP) to award grants to eligible entities to address cybersecurity risks and cybersecurity threats to information systems.


Additional Information

Security Governance Chart, with dedicated groups, leads, and work groups