Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore

Select a tab

Cybersecurity that connects agencies, institutions and communities

Whole-of-state is a collaborative approach to cybersecurity that strengthens defenses across the entire state ecosystem. Instead of securing state entities in isolation, it uses a shared framework to coordinate resources, standardize tools and align policies. The result is cybersecurity that protects agencies, institutions and the communities they serve.

Governments that take a whole-of-state approach can reduce risk, streamline operations and respond to threats more effectively. A focus on interoperability between new and legacy systems means they can also modernize securely. Beyond technology, whole-of-state cybersecurity builds a culture of trust and shared responsibility, helping attract talent and sustain momentum for initiatives.

Top considerations for adopting a whole-of-state cybersecurity strategy

COMMENTARY | A chain is only as strong as its weakest link, so states must emphasize collaboration and resource sharing across their entire ecosystem to better protect themselves.
News
•Mar 5, 2025

Securing the Future: Why a Whole-of-Enterprise Security Approach May Be Right for Your Organization

Blog
•Dec 16, 2024

Basics and Breakthroughs: How State and Local CISOs Can Walk the Line

State and local CISOs find themselves holding multiple truths. On the one hand, they must guard against sophisticated cyber threats — think AI-powered deepfakes and metamorphic malware. On the other hand, most attacks still occur because of gaps in basic cyber practices. CISOs must ensure agencies aren't using unsanctioned AI applications, but they also must be seen as AI enablers, not blockers. Join WWT experts and former state CISOs John Evans, Chief Technology Advisor, and Steve Meyer, Senior Consulting Security Architect, as they explore how CISOs can shine in a landscape characterized by basics and breakthroughs.  
Video
•33:30
•Mar 31, 2025

How do I get started with whole-of-state cybersecurity?

Many governments are still navigating how to adopt a whole-of-state approach to cybersecurity. Our experts guide the process, from building consensus and shared policies to designing governance models and technology plans. Through a phased approach, we help clients align stakeholders, define a unified vision and establish frameworks that strengthen cybersecurity across the entire state ecosystem.

Connect with our experts

John EvansChief Technology Advisor
Wade Van GuilderAVP, SLED Solutions and Architecture
Steve MeyerSenior Consulting Security Architect
John CoxSr Consulting Security Architect
Mark WhitworthPrincipal Advisor

Labs and learning paths to accelerate adoption

Whole-of-state cybersecurity requires more than strategy alignment. For adoption to take hold, teams need practical experience with how security capabilities work across technology vendors and operating environments. Our labs and learning paths allow teams to gain a hands-on understanding of how solutions relate to the top areas of concern driving whole-of-state initiatives. 

States are seeing a significant increase in distributed denial-of-service (DDoS) attacks as bad actors increasingly target service availability as a way to disrupt public trust. Mitigation requires traffic management tools like DDoS protection and next-generation firewalls to ensure service continuity. 

Start learning:

  • Palo Alto Networks Next-Generation Firewall (NGFW) Learning Path
  • Palo Alto Networks Next-Generation Firewall (NGFW) Intermediate Learning Path
  • Palo Alto Networks SASE Foundation Learning Path
  • Cisco Next-Generation Firewall (NGFW) Learning Path
  • Cisco NGFW Foundation Lab

Unpatched systems and misconfigured cloud environments weaken overall security posture. Regular vulnerability scanning, patch management, extended detection and response (XDR) and visibility tools help maintain resilience and visibility.

Start learning:

  • Tanium Proving Ground Lab
  • Armis: To Catch a Hacker Lab
  • Armis OT Security Learning Path
  • Armis Foundation Lab
  • SentinelOne Endpoint & AI SIEM Foundations Lab
  • SentinelOne XDR Learning Path
  • CrowdStrike and Zscaler Private Access Integrated Lab
  • CrowdStrike Proving Ground Lab
  • CrowdStrike EDR Learning Path
  • Palo Alto Cortex XDR Proving Ground Lab
  • Palo Alto Cortex XDR Learning Path
  • Cisco XDR Foundations Lab
  • Cisco XDR Learning Path

Excessive permissions and unmanaged third-party access can lead to data misuse. Zero trust network access (ZTNA), identity and access management (IAM), multi-factor authentication (MFA), and cloud access security broker (CASB) solutions enforce secure access controls.

Start learning:

  • Zscaler Internet Access, CrowdStrike, and Okta Integration Lab
  • Zscaler Zero Trust Lab
  • CyberArk Privileged Account Management Lab
  • Identify & Access Management with CyberArk Learning Path
  • Okta Foundations Lab
  • Okta Essentials Learning Path
  • Identity & Access Management (IAM) Learning Series
  • Zscaler Data Protection (SASE/Endpoint) Lab
  • Zscaler Internet Access: Secure Brand SSE (SASE Lab Series)
  • SASE - Zscaler Internet Access (ZIA)

Ransomware and system downtime can result in significant data and operational disruption for state and local agencies. Vaulting, backup, and recovery solutions are key to ensuring cyber resiliency and rapid restoration of services.

Start learning:

  • Cohesity Essentials Lab
  • Rubrik Cloud Data Management Essentials Lab
  • Getting Started with Rubrik: Data Protection Learning Path
  • Rubrik Cyber Recovery - Fundamentals Learning Path
  • Rubrik Data Protection Learning Path
  • Rubrik Cyber Recover - Intermediate Learning Path

Interactive training is critical to cybersecurity readiness across state and local organizations. The WWT Cyber Range provides IT practitioners with real-world, gamified scenarios that help them build the skills they need to be confident in day-to-day operations. By standardizing training and elevating cyber maturity across agencies, leaders can get teams moving in the same direction, a key success factor in whole-of-state adoption. 

Start learning:

  • Cyber Range Red Team Tools Learning Series
  • Security Operations Learning Series
  • AI Security Learning Path

Whole-of-state cybersecurity

Protect critical systems and citizen data across agencies, institutions and communities with a unified approach to cybersecurity.

1 Follower

At a glance

30Total
16Learning Paths
11Labs
2Blogs
1Video
What's related
  • Security
  • ATC
  • Cyber Range
  • Network Security
  • Security Operations
  • Endpoint Security
  • Cybersecurity Risk & Strategy
  • Okta
  • Cloud
  • Cloud Security
  • Identity and Access Management
  • Palo Alto Networks
  • Zscaler
  • Data Center
  • Data Protection & Cyber Recovery
  • Public Sector
  • Rubrik
  • SASE
  • CrowdStrike
  • State and Local Government

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies