Schaumburg, Ill., is another example of using network technology to improve resilience. The city divided its SCADA network into smaller segments serving very specific machines. Not only does this restrict the kinds of activity that can occur on a network, but in the event of a breach, it prevents lateral movement to other systems, which helps shore up cyber resilience.
This method, called microsegmentation, will be increasingly important as IT and OT systems converge, especially with the rise of APIs. Just as organizations once struggled to inventory their hardware and software, many agencies don’t even know all the APIs they use. That makes them an attractive vector for exploitation and further emphasizes the importance of proper asset discovery and network segmentation.
RELATED: Airports secure IT operations and improve business continuity.
Building Resilience Beyond Segmentation and Firewalls
Stopping and containing attacks is important, but cyber resilience is also about ensuring critical services can bounce back when disruptions happen. This requires backups for OT environments and IT infrastructure alike.
I’ve worked with counties that have built cloud backups to avoid catastrophic data loss for critical data systems. I also know of several jurisdictions that pooled their resources to create a joint security operations center, giving them the collective manpower to monitor and respond to incidents in real time. This level of preparedness across critical IT and OT environments is crucial to keeping the lights on, so to speak.
And speaking of keeping the lights on: Without electricity, even the best cyber resilience plans collapse. That’s why airports and data centers invest heavily in uninterruptible power supplies and generators. Some facilities can run for up to 48 hours without refueling, giving them critical time to recover. Extending this level of redundancy to other parts of local infrastructure — such as utilities or emergency services — can be the difference between resilience and failure.
READ MORE: AI helps utilities defend against cyberthreats.
Defending Critical Infrastructure Is a Shared Responsibility
Local governments don’t have to figure this out alone. Frameworks from CISA and the National Institute of Standards and Technology, such as NIST’s newly updated Cybersecurity Framework (CSF 2.0), provide practical roadmaps for building stronger defenses. CISA also offers a variety of no-cost services to help critical infrastructure providers shore up their cyber resilience.
Slowly but surely, we’re starting to see a shift toward treating cyber resilience as essential infrastructure, on par with power lines and clean water — because increasingly, that infrastructure relies on cyber resilience. Culturally, this will require some change. County or municipal commissions that have traditionally been siloed will need to collaborate more closely and create stronger inventories of systems and APIs.
At a minimum, remember that resilience starts with visibility. You can’t patch what you don’t see, and you can’t protect systems you don’t understand. For state and local governments, that means cataloging assets, isolating vulnerable devices and building redundancy into every layer of operations.