Skip to content
The FedNinjas

The Fedninjas

FedNinjas: Your Guide to Federal Cloud, Cybersecurity, and FedRAMP Success.

Primary Menu
  • Home
  • Blog
  • Podcast
Listen to us on Spotify!

Challenges in Securing State and Local Governments

Eric Adams April 4, 2025 6 minutes read
ChatGPT Image Apr 4, 2025, 11_23_29 AM

State and local governments (SLGs) are increasingly targeted by cyber threats, yet they often lack the resources, expertise, and infrastructure to mount an effective defense. From ransomware attacks on city infrastructure to breaches that compromise sensitive citizen data, SLGs face a unique combination of technical, financial, and organizational challenges. Addressing these vulnerabilities is critical not only to protect public services, but also to reinforce national cybersecurity resilience.

In this article, we’ll explore the key obstacles SLGs encounter in strengthening their cybersecurity posture, and examine strategies and frameworks that can help close the gaps.


Table of Contents

  1. Limited Funding and Resources
  2. Talent Shortages and Staff Turnover
  3. Outdated Legacy Systems
  4. Lack of Standardized Frameworks
  5. Inadequate Incident Response Capabilities
  6. Fragmented Governance and Coordination
  7. Effective Paths Forward

Limited Funding and Resources

One of the most significant challenges facing SLGs is the lack of dedicated cybersecurity budgets. While federal agencies benefit from national funding allocations, smaller jurisdictions often compete for limited funds across all departments.

A 2023 National Association of State Chief Information Officers (NASCIO) survey found that nearly 70% of states cite budget constraints as a barrier to cybersecurity improvements<sup>[1]</sup>. The cost of implementing endpoint protection, zero trust architecture, vulnerability scanning, and continuous monitoring quickly adds up.

Without reliable and consistent funding, cybersecurity becomes reactive rather than proactive. SLGs are often forced to delay critical updates or forego necessary training, leaving them exposed to well-known vulnerabilities.


Talent Shortages and Staff Turnover

Cybersecurity professionals are in high demand, and public sector salaries rarely compete with the private sector. As a result, SLGs face a chronic shortage of skilled personnel to manage and monitor their IT environments.

According to the Center for Digital Government, over 50% of government IT leaders report difficulty recruiting cybersecurity professionals<sup>[2]</sup>. Even when staff are hired, retaining them becomes a challenge due to lower pay and limited advancement opportunities.

This talent gap leads to overburdened IT teams, reduced visibility into threat activity, and slower incident response times. It also hinders the implementation of modern security tools and frameworks, compounding risk over time.


Outdated Legacy Systems

Many SLGs still rely on legacy IT systems that were never designed with modern security in mind. These platforms often lack support for multi-factor authentication, secure encryption, or even regular patching.

Outdated systems introduce numerous risks:

  • Incompatibility with current cybersecurity tools
  • Unpatched vulnerabilities exploitable by ransomware
  • Data stored in unencrypted formats
  • Difficulties in achieving compliance with federal standards

The Cybersecurity and Infrastructure Security Agency (CISA) emphasizes that legacy systems present some of the greatest cyber risks to state and local operations<sup>[3]</sup>. However, the high cost of modernization—and the operational disruptions that come with it—make upgrades a significant hurdle.


Lack of Standardized Frameworks

Unlike federal agencies, which are required to comply with standards like FISMA and FedRAMP, state and local governments operate with a patchwork of policies and practices. This decentralization results in uneven security postures and makes it difficult to assess risk uniformly.

Some municipalities adopt the NIST Cybersecurity Framework (CSF), while others develop their own internal guidelines. Without enforced baseline standards, smaller governments are left vulnerable and isolated, often unaware of best practices or emerging threats.

Organizations like the Multi-State Information Sharing and Analysis Center (MS-ISAC) provide guidance and alerts, but adoption varies widely<sup>[4]</sup>.


Inadequate Incident Response Capabilities

Even when detection occurs, many SLGs lack mature incident response (IR) plans or trained teams to manage a cyber crisis. This leaves them unable to contain attacks or recover quickly—prolonging downtime and increasing damage.

Key issues include:

  • No documented IR procedures
  • Lack of cyber insurance coverage
  • Limited use of tabletop exercises
  • Poor coordination with law enforcement or federal agencies

CISA reports that fewer than 20% of local governments have a tested IR plan in place<sup>[5]</sup>. Without preparation, even minor incidents can escalate into major disruptions.


Fragmented Governance and Coordination

Cybersecurity responsibilities in SLGs are often distributed across multiple departments, each with varying levels of technical expertise and authority. This fragmentation leads to miscommunication, duplicated efforts, and security gaps.

Unlike a centralized federal agency, local entities must balance cybersecurity with diverse priorities—public safety, transportation, education—all with their own IT infrastructures and vendors.

Efforts like the State and Local Cybersecurity Grant Program (SLCGP) aim to promote coordination and shared services<sup>[6]</sup>. Still, cultural and logistical barriers remain.


Effective Paths Forward

Despite the challenges, several strategies are proving effective for improving SLG cybersecurity:

🛡 Federal Support and Grants

Programs like SLCGP and the American Rescue Plan provide funding opportunities for SLGs to modernize their defenses. Proposals aligned with NIST or CISA recommendations are more likely to receive funding.

🧠 Shared Services and Regional Collaboration

Pooling resources through regional partnerships or state-run SOCs (Security Operations Centers) can reduce costs and improve response capabilities. Examples include Maryland’s MD THINK and California’s Cal-SOC.

📘 Adoption of Best-Practice Frameworks

Encouraging adoption of the NIST CSF, zero trust principles, and secure SDLC practices helps SLGs align with federal standards. MS-ISAC also offers tailored guides for SLGs.

📈 Workforce Development

Upskilling internal staff through certifications, bootcamps, and public-private partnerships can alleviate the talent gap. Programs like CyberStart America and NICCS offer free training to public sector workers.

🚨 Incident Response Planning

Every SLG should develop, test, and refine its IR plan. Coordinating with state-level CERTs and CISA improves access to rapid support during events.


Government Cybersecurity Depends on Local Resilience

Securing state and local governments isn’t just a local issue—it’s a national imperative. These jurisdictions operate critical infrastructure, process sensitive data, and deliver essential services that millions depend on daily. Yet without proper funding, frameworks, and personnel, they remain soft targets for sophisticated cybercriminals.

By investing in modernization, standardizing frameworks, and fostering collaboration between state, local, and federal partners, we can elevate the nation’s cybersecurity posture from the ground up.


References Cited:

  1. National Association of State CIOs – 2023 Survey on State Cybersecurity
    https://www.nascio.org/resource-center/
  2. Center for Digital Government – State and Local Cyber Workforce Report
    https://www.govtech.com/cdg/
  3. CISA – Legacy System Risks
    https://www.cisa.gov/news-events/news/legacy-technology-puts-critical-infrastructure-risk
  4. MS-ISAC – Resources for Local Governments
    https://www.cisecurity.org/ms-isac
  5. CISA – State and Local Cybersecurity Improvement Efforts
    https://www.cisa.gov/state-local-cybersecurity-grant-program
  6. Cybersecurity Grant Program – Application Overview
    https://www.fema.gov/grants/preparedness/state-local-cybersecurity-grant-program

About The Author

Eric Adams

See author's posts

Post navigation

Previous: Cracking the FedRAMP Code: Selling Cloud Services to the Government
Next: Securing the Skies: Why Security Must Fly Alongside Innovation in Cloud Computing

Related Stories

Cybersecurity during wartime

Escalating Cybersecurity Concerns During Global Conflicts

Eric Adams June 18, 2025
image

Applying and Validating Security Baselines in Production

FedNinjas Team May 30, 2025
Cyber security attacker data breach erosion of customer trust

Erosion of Customer Trust: The Fallout of Reducing Cybersecurity Headcount

Eric Adams May 25, 2025

Trending News

Claude Mythos and Project Glasswing: a Seismic Shift in Cybersecurity Claude Mythos and Glasswing Butterfly 1

Claude Mythos and Project Glasswing: a Seismic Shift in Cybersecurity

April 21, 2026
The Stryker Cyber Attack: A Mass Remote Wipe of its Managed Devices Stryker affected countries 2

The Stryker Cyber Attack: A Mass Remote Wipe of its Managed Devices

March 19, 2026
Agentic AI is the Attack Surface Agentic AI attack surfaces 3

Agentic AI is the Attack Surface

February 3, 2026
The Rise of Humanoid Robots in Modern Society Humanoid robots getting hackied 4

The Rise of Humanoid Robots in Modern Society

December 29, 2025
The Rise of AI Espionage: How Autonomous Agents Are Redefining Cyber Threats AI-orchestrated-cyber-espionage-campaign 5

The Rise of AI Espionage: How Autonomous Agents Are Redefining Cyber Threats

November 17, 2025
  • 3PAO assessments
  • Access Control
  • Advanced Threat Protection
  • Adversarial Modeling
  • Agentic AI
  • AI
  • AI and Quantum Computing
  • AI in Healthcare
  • AI-Powered SOCs
  • AI-Powered Tools
  • Anomaly Detection
  • API Security
  • Application Security
  • Artificial Intelligence
  • Artificial Intelligence
  • Artificial Intelligence in Cybersecurity
  • Attack Surface Management
  • Attack Surface Reduction
  • Audit and Compliance
  • Autonomous Systems
  • Blockchain
  • Breach Severity
  • Business
  • Career
  • CISA Advisory
  • CISO
  • CISO Strategies
  • Cloud
  • Cloud Computing
  • Cloud Security
  • Cloud Security
  • Cloud Service Providers
  • Compliance
  • Compliance And Governance
  • Compliance and Regulatory Affairs
  • Compliance And Regulatory Requirements
  • Continuous Monitoring
  • Continuous Monitoring
  • Corporate Security
  • Critical Infrastructure
  • Cross-Agency Collaboration
  • Cryptocurrency
  • Cyber Attack
  • Cyber Attacks
  • Cyber Deterrence
  • Cyber Resilience
  • Cyber Threats
  • Cyber-Physical Systems
  • Cyberattacks.
  • Cybercrime
  • Cybersecurity
  • Cybersecurity And Sustainability
  • Cybersecurity Breaches
  • Cybersecurity in Federal Programs
  • Cybersecurity Measures
  • Cybersecurity Strategy
  • Cybersecurity Threats
  • Data Breach
  • Data Breaches
  • Data Privacy
  • Data Protection
  • Data Security
  • Deepfake Detection
  • Deepfakes
  • Defense Readiness
  • Defense Strategies
  • Digital Twins
  • Disaster Recovery
  • Dwell Time
  • Encryption
  • Encryption Technologies
  • Federal Agencies
  • Federal Cloud
  • Federal Cybersecurity
  • Federal Cybersecurity Regulations
  • Federal Government
  • FedRamp
  • FedRAMP Compliance
  • Game Theory
  • GDPR
  • Global Security Strategies
  • Government
  • Government Compliance.
  • Government Cybersecurity
  • Healthcare
  • Healthcare Cybersecurity
  • Healthcare Technology
  • HIPAA Compliance
  • humanoid
  • Humans
  • Incident Response
  • Industrial Control Systems (ICS)
  • Information Security
  • Insider Threats
  • Internet of Things
  • Intrusion Detection
  • IoT
  • IoT Security
  • IT Governance
  • IT Security
  • Least Privilege
  • LLM Poisoning
  • Modern Cyber Defense
  • Nation-State Hackers
  • National Cybersecurity Strategy
  • National Security
  • Network Security
  • NHI
  • NIST Cybersecurity Framework
  • Operational Environments
  • Phishing
  • Privacy
  • Public Safety
  • Quantum Computing
  • Ransomware
  • Real-World Readiness
  • Red Teaming
  • Regulatory Compliance
  • Risk Assessment
  • Risk Management
  • Risk Management
  • Risk-Based Decision Making
  • robotics
  • Secure Coding Practices
  • Security Awareness
  • Security Operations Center
  • Security Operations Center (SOC)
  • Security Threats
  • Security Training
  • SIEM Tools
  • Social Engineering
  • Supply Chain Cybersecurity
  • Supply Chain Risk Management
  • Supply Chain Security
  • Sustainability
  • Tech
  • Technology
  • Third Party Security
  • Third-Party Risk Management
  • Third-Party Vendor Management
  • Threat Analysis
  • Threat Containment
  • Threat Defense
  • Threat Detection
  • Threat Intelligence
  • Threat Landscape
  • Training
  • Uncategorized
  • vCISO
  • Voice Phishing
  • Vulnerability Disclosure
  • Vulnerability Management
  • Workforce
  • Zero Trust Architecture
  • Zero Trust Authentication
  • Zero-Day Exploits
  • Zero-Day Vulnerabilities
  • Zero-Trust Architecture

You may have missed

Claude Mythos and Glasswing Butterfly

Claude Mythos and Project Glasswing: a Seismic Shift in Cybersecurity

Eric Adams April 21, 2026
Stryker affected countries

The Stryker Cyber Attack: A Mass Remote Wipe of its Managed Devices

Eric Adams March 19, 2026
Agentic AI attack surfaces

Agentic AI is the Attack Surface

Eric Adams February 3, 2026
Humanoid robots getting hackied

The Rise of Humanoid Robots in Modern Society

Eric Adams December 29, 2025
Copyright © All rights reserved.