You are here
WHAT WE DO AND WHAT WE PROTECT
Oklahoma Cyber Command is charged with protecting state users and their devices, networks, data and applications from malicious intent. The OMES Information Services supports Cyber Command in their objectives. Oklahoma Cyber Command’s top priority is safeguarding the state’s data and computer infrastructure against unauthorized data use, disclosure, modification, damage and loss. The Office of Management and Enterprise Services Information Services division supports Cyber Command’s vision to provide leadership in the development, delivery and maintenance of cybersecurity, information security risk management and information security auditing programs.
- Prevent attacks wherever possible.
- Respond rapidly.
- Return operations quickly.
- Manage negative outcomes.
- Learn from attacks.
- Return stronger and more prepared.
- Protect Oklahoma's information assets and maximize access to data.
- Develop robust and collaborative risk reduction and management strategies.
- Advance statewide approach to cybersecurity, privacy and compliance.
- Foster security- and risk-minded culture throughout Oklahoma's workforce.
Oklahoma Cyber Command Teams
- Compliance enforces controls established by regulations, law or industry standards that are designed to protect the confidentiality, integrity and availability of data.
- Privacy strives to minimize adverse consequences for individual privacy and ensure compliance with privacy regulations by addressing policies and procedures, advising on risk and mitigation and providing support in the event of a privacy incident.
- Defense Engineering designs, implements and enhances cyber defenses that proactively prevent or disrupt cyber threats across all supported State of Oklahoma agencies.
- Defense Operations maintains and operates cyber defenses that protect Oklahoma's information assets and supports Cyber Command and OMES IS engineering efforts.
- Hunt and Incident Response Team (HIRT) offers resiliency to the State of Oklahoma by providing the personnel and platforms necessary to detect, interdict and mitigate advanced cybersecurity, physical security and fraudulent activity threats.
- Cyber Operations is responsible for around the clock monitoring, detecting, investigating and responding to cyber threats against State of Oklahoma technology systems.
- Oklahoma Information Sharing and Analysis Center (OK-ISAC) is responsible for connecting members across Oklahoma to share cyber threat intelligence and improve cyber resilience at all levels of participation—local, regional and national—with enhanced information sharing across the state.
HOW WE PROTECT
- Identify – develop organizational understanding of managing cybersecurity risk to systems, people, assets, data and capabilities.
- Protect – establish appropriate safeguards to ensure delivery of critical infrastructure services.
- Detect – monitor cybersecurity events and verify effectiveness of protective measures.
- Respond – manage appropriate response to cybersecurity incidents.
- Recover – maintain plans for resilience and restore capabilities or services impaired by a cybersecurity incident.
Cyber Command Security Operations Center
The Cyber Command Security Operations Center monitors network traffic and reacts to threats. Intelligence feeds signal suspicious network activity by known “bad actors,” and the statewide security software allows personnel to determine when the system is compromised.
The Security Operations Center protects mission-critical networks 24/7/365. Staff responds to hackers, viruses, spam-email campaigns and anything that threatens the security of the state’s technology infrastructure. The benefits include:
- Efficient and cost-effective security monitoring.
- Rapid response to security incidents.
- Zero time and cost associated with testing software updates.
- Employees focus on core mission while we focus on security.
- Secure data.
- Peace of mind.