Critical Infrastructure Security
When the government steps back, who steps up to ensure adequate cyber defenses?

Credit: Cybersecurity and Infrastructure Security Agency (CISA)
These are uncertain times for cyber defenders working for both the federal government and private industry. The Trump administration's aggressive tariff policies and cutting of the federal workforce has made it nearly impossible for organizations to plan budgets, staffing and investments for the rest of 2025 and beyond.The uncertainty has left many in the cybersecurity profession worried about America's ability to fend off increasingly aggressive attacks from China, Russia, North Korea and Iran.Cory Simpson, CEO of the Institute for Critical Infrastructure Technology (ICIT), noted that China views its cyber weaponry as tools of economic warfare as opposed to traditional warfare. "China is more motivated than ever to attack critical US infrastructure as a response to the trade war," he said.Related content:Briefing: Strengthening U.S. energy infrastructure cybersecurity Single point of failure: The security threat no one’s talking about Sen. Hickenlooper highlights urgency of strengthening federal cyber resilience CRA/ICIT study highlights security concerns caused by digital consolidation China has already taken responsibility for Volt Typhoon intrusions against U.S. critical infrastructure, which involved the infiltration of several industries' systems through the exploitation of zero-day bugs and other advanced tactics; and cyber espionage operations by Chinese state-backed threat group Salt Typhoon against various U.S. telecommunications firms, which led to the compromise of U.S. officials' text messages and phone calls.Even deep cuts at the U.S. Department of Education threaten U.S. cybersecurity by disrupting education programs key to shaping the development of current and future cyber defenders, Simpson said.This, as the US Cybersecurity and Infrastructure Security Agency faces deep personnel and funding cuts. Up to 1,300 employees, or nearly 40% of the agency's workforce, may be laid off, threatening CISA’s ability to respond to rising cyber threats from nation-states and criminal networks. The downsizing affects key functions, including red team operations, penetration testing, and public-private threat intelligence sharing.In March, CISA halved MS-ISACs funding, curbing essential threat detection services for state and local agencies. Critics also point to the broader dismantling of advisory boards and suspension of the Critical Infrastructure Partnership Advisory Council, further eroding collaboration between sectors.Experts warn that the cuts will undermine CISAs coordination with private industry and local governments, which rely on partnerships like the Joint Cyber Defense Collaborative and the Multi-State Information Sharing and Analysis Center. The moves follow the removal of leadership at U.S. Cyber Command and the National Security Agency.Resourcing: Ensuring adequate funding and personnel are allocated to cybersecurity priorities. Recovery: Establishing robust protocols for bouncing back after incidents. Rehearsals: Conducting regular cyber exercises to simulate and refine response strategies. Response: Enabling swift and effective reactions to real-world threats. This framework is designed to scale across industries and sectors, forming the foundation of a distributed but coordinated cyber defense posture. As outlined in SC World and other resources like the Iowa Counties IT, it provides a path forward even in the absence of top-down direction.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds