STATETECH: Looking ahead 12 to 18 months, what are your top cybersecurity priorities, and how do they fit into the state’s broader strategy?
RITTER: Pennsylvania delivers IT through a centralized model, and continuing to strengthen that model is critical as we move forward. From a cybersecurity perspective, centralized governance allows us to deliver consistent services across agencies through our Enterprise Information Security Office.
From a technology standpoint, our priorities will continue to include zero trust, identity and access management, and strengthening our vulnerability management program. All of it ties back to reducing risk, improving service delivery for residents and reducing unnecessary complexity across the environment.
STATETECH: Zero trust is a major theme across state and local government. How far along is Pennsylvania on that journey?
RITTER: We’re making steady progress and continuing to mature. Zero trust allows us to simplify and standardize how we deliver secure services to employees and partners, regardless of where they’re working.
Historically, security was built around a perimeter — fortifying networks inside physical buildings. Today, our workforce is far more distributed. We want to provide a consistent, secure experience without forcing users into outdated models like constant VPN use. Security shouldn’t get in the way of work, and zero trust helps make security more seamless and embedded in the user experience.
STATETECH: How does Pennsylvania’s hybrid work environment factor into that?
RITTER: It’s very relevant. About 65% of our workforce is in the office every day, while the remaining 35% work in hybrid arrangements. Very few employees are fully remote. That mix makes it essential to deliver secure access regardless of location, which reinforces the importance of zero-trust approaches.
STATETECH: What types of tools or architectures are you leaning on to support zero trust?
RITTER: At a high level, it’s about moving the perimeter toward the cloud where appropriate and building security into the desktop and user experience. We’re moving away from legacy perimeter-based models and toward architectures such as secure access service edge, which supports modern work patterns while maintaining strong security controls.
READ MORE: Connecticut's CISO advocates for reducing the sprawl of security tools.
STATETECH: Vulnerability management and modernization are ongoing challenges for government. What’s on your punch list there?
RITTER: Visibility is everything. You can’t secure what you can’t see. Our goal is to identify risk quickly, understand where it exists and remediate it as efficiently as possible.
Zero-day threats are always top of mind. When something emerges, we need to be able to react immediately — identify affected systems, mobilize teams and remediate quickly. That requires the right tools, the right processes and the right people working together. Agility is critical.
