Unsupported Browser

We've detected an older browser version that will not give you the best experience while using The Atlas. Please consider revisitng this site after downloading one of the alternatives below.

IT Department establishes centralized cybersecurity roadmap by leveraging CIS18 framework

Contra Costa County

Contra Costa County, CA

Contra Costa County has 28 government agencies, each with different cyber needs. This left their approach to cybersecurity decentralized. After completing a CIS18 framework analysis, the county set a clear, long-term strategy designed to develop cyber resilience.

Topics Covered

Cybersecurity & Communications

Cost

Initial: Zero Upfront Cost

Funding

General Fund/Existing Public Funds

Project Status

Operational since 2022

Gov Champion

Assistant CIO and CISO

Problem Addressed

Contra Costa County's 28 agencies were left with a decentralized approach to its cybersecurity.

Crafting a uniform approach to cybersecurity strategy in county government is particularly challenging given the wide breadth and depth of requirements across a range of security domains; data privacy, availability of critical resources and systems, mandates for special protection of officially designed critical infrastructure, and even variances in acceptable risk tolerance levels by agency, to name a few.

Over time, the variance in needs in Contra Costa County resulted in a decentralized approach to cybersecurity across the county’s 28 agencies. This dynamic is common in many County governments and fosters an environment with an inconsistent implementation of controls and a lack of standardization in securing systems and data. Lacking a way to collaborate and communicate effectively towards a common set of priorities, agencies approach their cyber challenges in silos, increasing overall costs, and potentially, risk.

Solutions Used

The team developed an objective assessment of the cybersecurity program against the CIS18 controls framework.

To address this, Contra Costa County utilized the professional services of a trusted industry partner, AT&T Cybersecurity, to provide an objective assessment of the cybersecurity program against the CIS18 controls framework.

The Contra Costa County security team approached the challenge with a novel strategy in mind: leading by example in the central information technology office. Rather than attempting to dictate to their semi-autonomous agencies by policy, they set out to showcase success defined as reduced risk and improved capability maturity in the smaller central environment. Their proactive security and best practices then developed a standardized approach to cybersecurity for all agencies to adopt willingly and enthusiastically. This also served to build consulting, assessment, and control capabilities of the newly developed security team, and the partner service providers that they work with. This collective force could then serve to guide others within the organization in their own unique challenges.

Beginning with the establishment of a baseline of controls using the Center for Internet Security (CIS) Critical Security Controls, the County security team was able to identify the greatest areas of risk in their environment, shore up gaps and weaknesses in their program, and set a long-term strategy that had the greatest return on investment for the citizens of Contra Costa County.

This solution has served to help provide direction and alignment of resources around a standardized and understandable “security baseline” for the organization, and ensure the collective team is moving jointly in a shared direction.

Outcomes

1

Long-term strategic cybersecurity roadmap and plan developed after risk assessment

2

Efficient budgeting and resourcing or the county through a centralized strategy

3

Improved collaboration and alignment of initiatives across IT, cyber, and business thanks to baseline controls outlined by the Center for Internet Security (CIS)

Lessons Learned

1

Security risk management does not have to be complex.

2

A team approach within government as well as public private coordination is necessary to achieve success.

3

Bringing in an external partner with lots of private sector experience managing cyber risks to do an objective audit can help a country modernize more quickly.

4

Federal funding, ARPA and IIJA included, can be used for projects, including this one, that build resilient cybersecurity infrastructure.

Something Unique

The CIS18 are a risk ranked set of security best practices that organizations can understand, achieve, and measure against. Implementing these recommendations can help mitigate against most cyber-attacks. Government entities can gain access to the CIS organizations materials free of charge at The 18 CIS Critical Security Controls (cisecurity.org).

Who Should Consider

Organizations that are building out new security programs, or those that need a “reboot” to a more understandable shared vision.

Last Updated

Mar 21st, 2022

More resources about this case study

More Local Gov Case Studies from The Atlas Database
The Atlas case study database features examples of city projects – including both earth-moving projects and installed technologies – from around the world. You will not find proposed projects, or links to research studies and planning documents. There are 500+ member submitted case studies to browse - see related case studies to this one below:
Browse All Case Studies