Secure California’s Technology Investments

Goal 2

Secure California’s technology investments to have cyber hygiene, cyber resilience, and cyber maturity. 

goal two icon

Outcome: Cyber Hygiene

Proactive evaluation and investment in California’s security posture.

Strategies:

  • Prioritize and strengthen the health and security of the State’s technology assets.
  • Improve awareness of the constant, changing, and increasing risks, threats, and impacts of cybersecurity events.
goal two icon

Outcome: Resilience

Government resiliency achieved by quickly adapting to challenges.

Strategies:

  • Safeguard the State’s data and technology assets from malicious attacks.
  • Proactively monitor all attack surfaces for vulnerabilities, exposures, and malicious activity. 
  • Perform robust risk analysis and testing that prioritizes business continuity, disaster recovery, and incident response plans. 
goal two icon

Outcome: Cyber Maturity

Readiness to defend the State’s digital assets against threats. 

Strategies:

  • Optimize the impact of cyber security statutes, regulations, policies, and standards. 
  • Prepare the State to prevent and respond to dynamic digital security threats. 
  • Actively collaborate with federal, industry, and academia experts to leverage private sector research and development. 

The state’s cyber security experts across agencies – Cal OES, the California Department of Technology, the California Military Department, and the California Highway Patrol – work as one team through the California Cyber Security Integration Center (Cal CSIC) to defend California from ever-increasing cybersecurity threats.