Get Full Government Meeting Transcripts, Videos, & Alerts Forever!

State cybersecurity office reports expanded services, warns of intelligence, workforce and funding gaps

August 25, 2025 | Science, Technology & Telecommunications, Interim, Committees, Legislative, New Mexico


This article was created by AI summarizing key points discussed. AI makes mistakes, so for full details and context, please refer to the video of the full meeting. Please report any errors so we can fix them. Report an error »

State cybersecurity office reports expanded services, warns of intelligence, workforce and funding gaps
The New Mexico Office of Cybersecurity on Aug. 14 told the Senate Technology and Telecommunications Committee it has stood up enterprise services — including a security operations center and mandatory multifactor authentication for executive‑branch systems — but officials said declining federal supports and limited recurring state funding raise near‑term risks.

Office director Raja Simbenam said the office provides services to executive branch agencies and to interested public entities on a voluntary basis; it reported serving 73 agencies with networks and assisting counties, municipalities, K‑12 schools, higher‑education institutions and water/wastewater systems when those entities opt in. "OCS provides service to interested public entities such as K‑through‑12, higher educational institutions, counties, municipal‑ities, tribal entities, water and wastewater systems," Simbenam said.

Why it matters: state information systems hold sensitive data and control critical services; vulnerabilities in partner organizations or legacy systems can escalate quickly. Dan Garcia, the office’s senior program manager, told the committee that the current set of systemic vulnerabilities is serious: "There is a ticking time bomb," he said, adding that the office addresses hundreds of thousands of vulnerabilities across state systems and conducts daily incident‑management work.

Highlights and achievements presented to lawmakers included: the implementation of statewide multifactor authentication (MFA) for executive‑branch users, an enterprise risk and vulnerability scanning program, a unified security monitoring platform (the security operations center) and an awareness program that reduced simulated‑phishing failure rates to 3.9 percent (compared with a government‑sector industry average of about 17.9 percent). Simbenam told the committee that the MFA rollout began over a weekend and that users were completing registration the morning of the hearing.

The office reported a State and Local Cybersecurity Grant Program award (year‑one funding of $2.4 million) and work with federal partners to provide scanning and templates for incident response plans to 73 selected water and wastewater systems. Simbenam said the office coordinated with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and with state environment and health partners on that work.

Challenges cited by the office include reductions in free federal threat‑intelligence services, the move of the Multi‑State ISAC to a fee‑based model, a tightening federal cybersecurity workforce and the termination or restructuring of certain federal review services. Simbenam said those changes have increased the state office’s workload and left it to absorb additional operational responsibilities.

On funding, officials said most earlier work relied on one‑time special appropriations and grants. Simbenam said recurring operating funding is needed to sustain enterprise defenses and core services; the office estimated mid‑tens of millions of dollars would be required for a full recurring operating budget, depending on scope. Simbenam asked the committee for continued support and said the office will return in September with FY‑26 plans and in October to discuss funding and any legislative changes.

Some lawmakers asked for more visibility into non‑executive branch cybersecurity practices and whether technical details could be addressed in a closed session; office staff said they could provide deeper technical briefings under appropriate confidentiality.

Taper: The office stressed that it has made rapid operational progress but that ongoing support and external intelligence/workforce resources are necessary to sustain protections for the state’s networks and critical services.

Don't Miss a Word: See the Full Meeting!

Go beyond summaries. Unlock every video, transcript, and key insight with a Founder Membership.

Get instant access to full meeting videos
Search and clip any phrase from complete transcripts
Receive AI-powered summaries & custom alerts
Enjoy lifetime, unrestricted access to government data
Access Full Meeting

30-day money-back guarantee

Sponsors

Proudly supported by sponsors who keep New Mexico articles free in 2025

Scribe from Workplace AI
Scribe from Workplace AI