* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Customer Spotlight](https://www2.paloaltonetworks.com/blog/category/customer-spotlight/) * North Dakota's Big Cybers... # North Dakota's Big Cybersecurity Vision [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2019%2F08%2Fnorth-dakota-cybersecurity-vision%2F) [](https://twitter.com/share?text=North+Dakota%E2%80%99s+Big+Cybersecurity+Vision&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2019%2F08%2Fnorth-dakota-cybersecurity-vision%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2019%2F08%2Fnorth-dakota-cybersecurity-vision%2F&title=North+Dakota%E2%80%99s+Big+Cybersecurity+Vision&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2019/08/north-dakota-cybersecurity-vision/&ts=markdown) \[\](mailto:?subject=North Dakota’s Big Cybersecurity Vision) Link copied By [Shawn Riley](https://www.paloaltonetworks.com/blog/author/shawn-riley/?ts=markdown "Posts by Shawn Riley") Aug 14, 2019 7 minutes [Customer Spotlight](https://www.paloaltonetworks.com/blog/category/customer-spotlight/?ts=markdown) [IOT security](https://www.paloaltonetworks.com/blog/tag/iot-security/?ts=markdown) [State of North Dakota](https://www.paloaltonetworks.com/blog/tag/state-of-north-dakota/?ts=markdown) [Zero Trust](https://www.paloaltonetworks.com/blog/tag/zero-trust/?ts=markdown) ***This piece was originally published August 6 on [Security Roundtable](https://www.securityroundtable.org/north-dakotas-big-cybersecurity-vision/).*** The people of North Dakota have a lot to be proud of. Our state is a leader in agriculture, energy and national defense. We're believers in humility and modesty---strong Midwestern values that define how we go about our day at work, home and school. But there is one thing we feel so proud of that we hope you'll forgive us if we are uncharacteristically boastful: We intend to be the most connected state in America. Yes, in a country with such acknowledged technology-oriented states as California, New York, Texas and Massachusetts, we are positioning North Dakota to be a pioneer in the digital transformation of government, education, business, workforce and society. We are also planning to make cybersecurity the lingua franca of a digital North Dakota. These goals seem lofty -- maybe even a stretch -- for a state that has the second smallest population in the United States, is the most rural in the nation, and has an annual budget that would be little more than a rounding error compared to California or New York. But you don't need to be a colossus to be a leader. You do, however, need to be smart, resourceful, innovative and deeply dedicated to excellence in strategy, execution and communication. From the halls of the state capitol to every classroom, we're prioritizing cybersecurity as a state in order to protect our critical systems, safeguard the data of our citizens, train our next generation to succeed, and create the digital workforce of the 21^st^ century. ### **Every Student Cyber Educated** To get to where we want to be, we're focused on comprehensive education in computer science. Our state's K-20W initiative is key to bringing together 40 different public- and private-sector entities to empower North Dakota's workforce, educators and students from kindergarten through PhD. That's why K-20W's mantra is: "Every student, every school, cyber-educated." We're establishing an overarching goal of training 700 teachers across the state on both computer science and cybersecurity, giving us at least one cyber-trained teacher for every 160 public school students. Every student graduating school today is entering a digital society. Regardless of career path, nearly every job in the 21^st^ century uses computer technology. It's time that every student learns the essential tools, as well as the risks and rewards. Cyber education isn't just about unleashing the potential of machine learning and Internet of Things, it's also about driving cybersecurity awareness and action on all levels, attracting and retaining businesses to fuel economic growth. This is why we're giving parents, students, teachers and educational institutions the tools that they need to put cybersecurity front and center. ### **Whole of Government Cyber Defense** We formed a cybersecurity framework across the entire state---unifying what had once been a patchwork of silos. We embraced the concept of "whole of government" cyber defense, spanning all seven branches of public sector entities across the state: executive, legislative, judicial, higher education, K-12 education, cities and counties, helping to elevate our collective security posture for 252,000 statewide network users. We wanted to avoid the inefficiency and inevitable gaps created by implementing cybersecurity at only opportunistic, transactional levels by departments and entities. By committing ourselves to covering every aspect of North Dakota's public sector, we will become operationally more secure and make cybersecurity second nature to everything we do. ### **A Proactive Mindset Toward Security** To embark on our statewide security transformation, we had to avoid the death trap of simply chasing every cybersecurity fire. We needed to shed the mindset of reacting to each breach, each zero-day attack, each ransomware and DDoS attack and treating them as one-off problems. ![](https://www.securityroundtable.org/wp-content/uploads/2019/08/North-Dakota-cyber-stats-1024x558.png) Instead, we needed to get out in front with a proactive plan to utilize technology, people and process as part of an active defense mindset. Techniques like threat hunting, network behavior analysis and other steps have allowed us to funnel out the noise to go far beyond reacting to known threats, and instead catch attacks before they happen. Core elements of our strategy include: **Zero Trust:** We committed to the [Zero Trust model of cybersecurity](https://www.securityroundtable.org/interview-with-tony-scott-former-federal-cio-on-the-wake-up-call-for-zero-trust/) defense from the very start; in fact, we've employed Zero Trust for more than 70% of our data centers. It's a big workload, but well worth it. **IoT security:** Having a big military and defense footprint in the state, as well as massive agricultural and energy sectors, means that North Dakota was an early adopter of the IoT. Think about the use of drone radar systems for Homeland Defense and other military applications, and the future need for a billion sensors to cover our farmlands and environmental ecosystems. You can't do the "farm of the future" without IoT, and you can't do IoT without a specific plan to secure sensors, chip sets and other connected things. **Cloud-first strategy:** Obviously, it's not just small states like North Dakota that need the agility, flexibility and cost efficiency of the cloud. Every state, and every commercial entity, should move toward a cloud-first paradigm to encourage a nimbler approach to security. ### **Lead by Action, and Courage** Leadership requires many qualities, including courage, open communication, and creativity. Whether it's embracing new technologies or prioritizing cybersecurity, our approach has been: Why not? Or how can we do this? In fact, our new information technology vision is in the form of a question: How might we deliver world-class technology and services to our state? We've done a lot so far, including: * The state's Department of Public Instruction has teamed with state and industry experts to draft integrated computer science and cybersecurity standards---making us the first state in the nation to emphasize cybersecurity in such an integral manner -- and we did it in just 11 months. * We passed comprehensive legislation that allows for strategic cyber defense for every governmental entity across the state. * North Dakota State University and Bismarck State College have been designated as Centers of Academic Excellence in Cyber Defense by the National Security Agency and the Department of Homeland Security. * Our partnerships with local entrepreneurs and national organizations like code.org, NICERC and NCWIT are yielding tangible benefits in terms of classroom resources, coding camps and professional development. * In our first year of participating in the SANS Institute "Girls Go CyberStart" and "College FastTrack," we achieved the highest per-capita participation of all states taking part in the programs. And we plan to do more, like hosting legislative technology showcases, partnering with private-sector cybersecurity leaders such as Palo Alto Networks, and promoting opportunities in computer science for women and girls. We're incredibly lucky that the North Dakota Governor Doug Burgum, Chancellor Mark Hagerott, and my CISO colleague Sean Wiese are likeminded in envisioning the digital future. Numerous other stakeholders, as well as North Dakota citizens, have done much to help build that future. Which brings me to a personal anecdote. My 14-year-old daughter was looking over her class roster for the new school year, and I could tell she was a bit miffed (as only teenagers can be). She handed me a piece of paper and plaintively asked, "Where are my technology classes?" Now, my daughter is not necessarily going to be a coder or a bug-hunter, but she certainly has experienced enough technology in her short life to know what has taken years for many of us to learn: You can't have a digital society unless you start very early. And that means having a strategic plan for cybersecurity that doesn't wait for you to graduate college or enter the workforce. *Shawn Riley is chief information officer of the state of North Dakota.* *** ** * ** *** ## Related Blogs ### [Data Security](https://www.paloaltonetworks.com/blog/network-security/category/data-security/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) [#### The Medical IoT Security To Depend on When Lives Depend on You](https://www2.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Next-Generation Firewalls](https://www.paloaltonetworks.com/blog/network-security/category/next-generation-firewalls/?ts=markdown), [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown), [Zero Trust Security](https://www.paloaltonetworks.com/blog/network-security/category/zero-trust-security/?ts=markdown) [#### Zero Trust for Infrastructure: A Key Step in Addressing IoT Security Risks](https://www2.paloaltonetworks.com/blog/network-security/zero-trust-iot-security-risks/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Bringing Zero Trust SASE to Your Doorstep with SASE Private Location](https://www2.paloaltonetworks.com/blog/sase/bringing-zero-trust-sase-to-your-doorstep-with-sase-private-location/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Achieve True Zero Trust and Peak Performance with Prisma Access 6.1](https://www2.paloaltonetworks.com/blog/sase/achieve-true-zero-trust-and-peak-performance-with-prisma-access-6-1/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Protecting the Utility Grid's Digital Ecosystem, from Core to Edge to AI](https://www2.paloaltonetworks.com/blog/network-security/protecting-the-utility-grid-digital-ecosystem-from-core-to-edge-to-ai/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Customer Spotlight](https://www.paloaltonetworks.com/blog/category/customer-spotlight/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) [#### Value Exchange in Cybersecurity](https://www2.paloaltonetworks.com/blog/2025/08/value-exchange-in-cybersecurity/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language