Overview

October 18

Watch Now

As cybersecurity threats have become more prevalent and more harmful in recent years – and as the threat landscape itself has become exponentially more dispersed and harder to secure – one truth has become increasingly evident: State and local governments can’t handle this on their own.

Outside of a few large states and a small handful of big cities, the vast majority of governments lack the staff, funding and expertise it takes to keep up with the quickly evolving demands of securing networks, protecting data and maintaining constituent trust in government IT.

Enter cybersecurity as a managed service. As governments realize they can’t manage their entire security portfolio in-house, it’s important to consider how to best leverage the expertise and resources of the private sector.

But in what cases does cybersecurity-as-a-service make sense? When is it a bad idea? Who’s liable when a breach occurs? What questions should you ask before partnering with a cybersecurity service provider?

Join us for this webinar conversation with public IT leaders on the ins and outs of adopting a managed service model for cybersecurity.

Speakers

Adam Ford  headshot

Adam Ford

Chief Information Security Officer, Department of Innovation and Technology, IL

Adam Ford currently serves as the Chief Information Security Officer for the State of Illinois at the Department of Innovation and Technology. In addition to oversight of State of Illinois information security systems and risk programs, Adam also manages the Illinois Election Cyber Navigators in partnership with the Illinois State Board of Elections and the Illinois State Police’s Statewide Terrorism and Intelligence Center. In his 18 years with the State of Illinois, he has held a number of roles in information security and computer networking. He holds a master’s degree in Cybersecurity and Information Assurance from Western Governors University and a bachelor’s degree from Illinois College. Adam is a Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH).

Lester Godsey  headshot

Lester Godsey

Chief Information Security Officer for Maricopa County, AZ

Lester Godsey is the Chief Information Security Officer for Maricopa County, AZ - leading all cybersecurity and data privacy efforts for the organization. Prior to Maricopa County, Lester was the CISO/CPO for the City of Mesa, AZ. With over 25 years of higher education and local government IT experience, Lester has spoken at local, state and national conferences on topics ranging from telecommunications to project management to cybersecurity and data. Lester has taught at the collegiate level for over 12 years in the areas of technology, business and project management. The author of numerous trade journal and online magazine articles, he is CISM (Certified Information Security Manager) and PMP (Project Management Professional) certified. He holds a BA in Music and a MS in Technology, both from Arizona State University.

Dan Lohrmann headshot

Dan Lohrmann — Moderator

Senior Fellow, Center for Digital Government

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 – August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. He works with cybersecurity technology companies to provide insights and long-term strategic support. Dan is a Senior Fellow with the Center for Digital Government and a contributor to Government Technology magazine. Dan currently serves as Field CISO for the public sector at Presidio. He is the co-author of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions, published by Wiley in November, 2021. He is also the author of two earlier books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work.