The Texas Senate Committee on Business and Commerce convened on May 20, 2025, to discuss the establishment of a new Cyber Command under the University of Texas System, specifically administratively attached to the University of Texas at San Antonio (UTSA). This initiative aims to enhance the state's cybersecurity capabilities amid growing threats.
The proposed Cyber Command will consist of three main components: a Cybersecurity Threat Intelligence Center, a Cybersecurity Incident Response Unit, and a Digital Forensics Lab. Each of these units will have its own director and staff, with the overall chief appointed by the governor and reporting directly to both the governor and the legislature. This structure aims to ensure clear oversight and operational command, emphasizing the urgency of establishing this command due to increasing cybersecurity risks.
Before you scroll further...
Get access to the words and decisions of your elected officials for free!
Subscribe for Free Committee members expressed concerns regarding the command's affiliation with a higher education institution, particularly in light of past security lapses at universities across the nation. The discussion highlighted the potential vulnerabilities associated with placing a critical cybersecurity entity within a university ecosystem. However, proponents reassured the committee that the leadership at UTSA is aware of these risks and will implement stringent security measures, including thorough vetting of personnel and robust physical security protocols.
The Cyber Command's location in downtown San Antonio was noted as strategic, given the area's concentration of cybersecurity expertise and proximity to federal assets. The building designated for the command is described as a new facility built to high security standards, separate from the main university campus, which should mitigate some of the concerns raised.
Overall, the committee's discussions underscored the importance of swiftly establishing the Cyber Command to bolster Texas's defenses against cyber threats, while also addressing the necessary security measures to protect sensitive operations within the university environment. The next steps involve finalizing the command's structure and ensuring that all security protocols are in place before its launch.