Connect with us

Hi, what are you looking for?


Risk Management

Maryland Officials Outline Package to Tighten Cybersecurity

Maryland lawmakers highlighted a package of measures Wednesday to tighten cybersecurity in the state.

Maryland lawmakers highlighted a package of measures Wednesday to tighten cybersecurity in the state.

Maryland House Speaker Adrienne Jones noted that Baltimore County was one of about 50 school systems across the nation attacked with ransomware in 2020, costing the county millions of dollars. In December, Maryland’s health department was hit by a ransomware attack that impeded information about health metrics relating to COVID-19.

“This package will help give our state agencies and local governments every tool in the toolbox to secure our IT networks and ensure our response to a cyberattack is swift, unified and coordinated,” Jones, a Baltimore County Democrat, said during a videoconference.

One of the measures would increase coordination between state and local governments in cybersecurity.

“Other states have moved toward centralization, and we join them in that move nationally, which makes it easier to address a threat as well as makes it, at least from what we’ve seen, less expensive to then recover from a threat,” said Del. Pat Young, a Baltimore County Democrat.

Another measure would provide funds to local governments for information technology upgrades. Lawmakers are planning to use federal money, as well as some of the state’s budget surplus.

A third bill addresses emergency response. It would create a Cyber Preparedness Unit to support local governments in assessing how vulnerable they are to cyberattacks. The bill also would create a Cybersecurity Fusion Center to serve as a central location for information about incidents.

Advertisement. Scroll to continue reading.

Mark Ripper, director of Carroll County’s Department of Technology Services, said the fusion center will better enable the sharing of information so local governments can take steps to protect themselves from an attack that has happened elsewhere.

“It’s really great to know, if somebody else has been attacked, exactly what happened,” Ripper said.

Keith Young, an official in Montgomery County’s Enterprise IT Security Office, called the package of legislation an important first step. He said “a chain is only as strong as the weakest length.”

“Unless (the) state and counties work together to build a statewide strong chain of cybersecurity defenses, cyber attackers will find government entities who do not have the proper protections in place and use those weaknesses to attempt to gain access to connected entities like Montgomery County,” Young said.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.