Cybersecurity

fingers typing on a keyboard with security icons overlayed

Protect Yourself Online

The State of Wisconsin's Mission is to Protect the State of Wisconsin and its citizens from an array of Cybersecurity Threats and has gathered the following information for you to be safe online.


Protect
Cybersecurity protection icon  
Cybersecurity Protection Goal: Establish an information security operation that embodies national excellence and protects our data.
  • Governor's Cyber Summit: This annual summit brings together national cybersecurity experts, government and academic leaders and the business community to share knowledge and experience in finding new ways to protect our digital infrastructure and address the emerging challenges of cybersecurity.
  • Women in Cybersecurity: Is an annual event held in conjunction with the Governor’s Cybersecurity Summit. The event focuses on the growing and evolving opportunities for women in the cybersecurity field. It brings professionals together from the public and private sectors, who are leaders and innovators, to discuss important topics in the field.
  • Wisconsin Cyber Threat Response Alliance (WICTRA): WICTRA serves as the Private/Public Sector hub for collaborative cyber information sharing in a trusted environment.
  • InfraGard WISCONSIN: Partnership between the U.S. Federal Bureau of Investigation (FBI) and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.
  • Multi State Information Sharing and Analysis Center (MS-ISAC): As a trusted cybersecurity partner for U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, MS-ISAC cultivates a collaborative environment for information sharing in support of our mission. They offer members incident response and remediation support through their team of security experts and develop tactical, strategic, and operational intelligence, and advisories that offer actionable information for improving cyber maturity.
  • CIS Critical Security Controls: Has a prioritized set of actions to protect your organization and data from cyber-attack vectors.
  • National Cybersecurity Strategy: The strategy positions the United States and its allies and partners to build a digital ecosystem together, making it more easily and inherently defensible, resilient, and aligned to benefit us all.
Respond
Cybersecurity response icon  
Cybersecurity Response Goal: Establish statewide processes, procedures, and practice incident responsiveness that can reply and support cybersecurity incidents across the state.
  • Cyber Response Teams (CRT): The Cyber Response Teams strive for a safer, stronger environment for users by responding to major incidents, analyzing threats, and exchanging critical cybersecurity information with trusted partners.
  • ReadyWisconsin has a resource website that has tips for Protecting yourself, before, during, and after a cyberattack.
  • Report an Incident contacts for State Agencies, Local Government, Tribes, School Districts, and Private Industry.
Incident Reporting Flow Chart
Education
Cybersecurity education icon  
Cybersecurity Education Goal: Build an integrated ecosystem of cybersecurity education across the State to address the continued shortage of cybersecurity professionals in Wisconsin. This would include preparing administrators and teachers of cybersecurity, providing and supporting opportunities for those interested in cybersecurity, and creating a more cybersecurity aware next generation in Wisconsin.
Compliance
compliance checkmark icon  
Cybersecurity Compliance Goal: Promote organizational adherence to applicable federal and state security requirements and laws.
Engage and Transform
Engage & Transform icon  
Cybersecurity Engage and Transform Goal: Promote and lead digital transformations that encourage change, agility, speed, connectivity, and the introduction of new processes and technologies. Utilizing cyber​security as an enabler and positive discriminator for business and operations.
  • get.gov: .gov domains are available at no cost to qualifying U.S.-based government organizations. CISA, the Cybersecurity and Infrastructure Security Agency, sponsors the .gov top-level domain at the federal level.
  • DET Cloud Brokerage (wi.gov): Connecting to the cloud is an exciting opportunity for many organizations these days. DET has valuable security information and tools that you might find helpful as you embark on your own cloud journeys.
  • Infrastructure Investment and Jobs Act: There is funding available to help address cybersecurity risks and threats for state and local governments.
  • grants.gov: There are several grant opportunities that become available throughout the year from the federal government. Many of those grants have requirements, information, and deadlines that can assist with programs and projects you are asked to support.
  • State and Local Grant Programs: The Infrastructure Investment and Jobs Act (IIJA) established grant funding through the State and Local Cybersecurity Grant Program (SLCGP) to award grants to eligible entities to address cybersecurity risks and cybersecurity threats to information systems.
Additional Information
Security Governance Chart


Back to top button