NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Realize the Full Value of Microsoft Security
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • ARC-AMPE Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • SOC as a Service
      • Microsoft Security Managed Services
      • Splunk Managed Services
      • Tenable Managed Services
      • CrowdStrike Managed Detection and Response (MDR)
      • Vendor Security Assessments
      • Curated Threat Intelligence
      • Vulnerability Management
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Downloadable Assets icon Downloadable Assets
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Industry Insights
    • Compliance
    • Security Operations
    • Cybersecurity Technology
    • Advisory and Planning
    • Security Testing
    • Application Security
    • Threat Intelligence
    • Managed Detection and Response
    • Managed Services
    • Cyber Talent
    • NuHarbor
December 11, 2025

CISA’s New Relationship with MS-ISAC

Justin Fimlaid Justin Fimlaid
CISA’s New Relationship with MS-ISAC

What State and Local Leaders Need to Know

For twenty years, MS-ISAC functioned like the public sector’s neighborhood watch with a direct line to the patrol car. It delivered federally underwritten threat intelligence, kept Albert sensors humming in the background, and provided a SOC that answered the phone at two in the morning. That comfort came from a long-running cooperative agreement between CISA and the Center for Internet Security, which operates MS-ISAC. At the close of FY25, that agreement reached its planned finish. CISA didn’t drop the mission; it changed how it supports it, emphasizing grants, no-cost tools, performance goals, and hands-on expertise delivered directly to state, local, tribal, and territorial partners. 

What Changed and What’s Still Available 

The turn was visible months before fiscal year-end. In early March, the federal government pulled funding for ten MS-ISAC work categories. The cuts hit high-touch items that smaller programs leaned on; tailored threat analysis and distribution, around-the-clock incident response and SOC surge, member onboarding and account management, and the training and outreach that kept newer teams moving in step. CIS bridged pieces of this through the end of the fiscal year, but those measures were temporary. 

To stay sustainable without federal underwriting, MS-ISAC adopted a tiered, fee-based membership model. Pricing is keyed to the supported portions of an organization’s operating budget, with discounts or waivers for jurisdictions that truly cannot pay. The tent is still large; the difference is you now choose your seat and share the cost of the canvas. 

Some services continued through September 30 under the expiring agreement. Albert Network Monitoring and Management stayed in place. MDBR protective DNS kept blocking known bad domains. Routine advisories still went out. After that date, access becomes a membership or contracting question. If Albert is part of your detection backbone, you should already be coordinating directly with MS-ISAC on coverage and renewals. 

CISA didn’t leave the field, it moved positions. Instead of paying MS-ISAC to do a broad set of things for everyone, CISA is leaning into what it can deliver at national scale with local impact. That means grants through state, local, and tribal programs; no-cost technical services such as Cyber Hygiene scans, phishing assessments, and vulnerability management; practical frameworks like the Cybersecurity Performance Goals and tools to assess against them; and human help via regional advisors, SLTT coordinators, bi-monthly SOC calls, and federal incident-response coordination. CISA also says collaboration with MS-ISAC continues. Joint advisories and information sharing still happen, just bundled differently. 

What moved behind the MS-ISAC paywall are the high-touch pieces: tailored cyber threat intelligence with actionable context, 24×7 SOC and incident surge, member enablement and account management, training, and working groups. Outside the paywall, CIS continues to publish some TLP: CLEAR advisories, and the broader CIS ecosystem maintains free resources like Benchmarks and baseline tools. Yesterday’s prepaid buffet is now a menu. You’ll still eat well if you plan your order and budget.

Why Leaders Should Care and What It Means for You 

If you run technology for a state agency, a county, a city, or a large public institution, your operating model just shifted. Yesterday you leaned on MS-ISAC for curated intel, after-hours help, and structured enablement without a local procurement step. Today you decide what remains through membership, what you replace with alternatives, and what CISA covers with free services. This is not a crisis. It’s a budgeting and operations change that rewards planning. 

Start with risk. The most expensive losses after a funding pivot appear in the quiet space between awareness and action. If your intelligence pipeline gets thinner or slower, your SOC spends more time triaging noise and less time closing real findings. If surge support isn’t on tap, containment stretches and dwell time grows. Small and rural teams feel this first because they counted on MS-ISAC for context, coaching, and quick reinforcement. The fix is clarity. Write down who provides what on Monday morning and make sure those answers are real. 

Address money next. Membership preserves the high-touch parts of MS-ISAC, which means a line item. Grants remain powerful, but current rules don’t let you buy MS-ISAC or EI-ISAC memberships with SLCGP funds. Use those dollars to harden the things that make membership more valuable: raise the floor on identity, clean up logging and log routing, strengthen endpoint visibility, and fund tabletop exercises that involve the people who will actually respond. The outcome you want is a stack that performs even if one piece hiccups. 

Operations will feel different. Threat intelligence that used to arrive with local context may now come from a mix of MS-ISAC products, CISA advisories, commercial feeds, and state shared services. That means you need an internal intelligence rhythm. Decide who collects, who triages, and who tasks the work. Establish a weekly cadence so your SOC knows which signals become detections, hunts, or hands-on checks. The better the drumbeat, the less you worry about who played the original notes. 

Incident response needs a grown-up plan. If you rely on MS-ISAC for round-the-clock surge, membership likely makes sense. If you do not, line up a retained IR partner and refresh your playbooks with clear CISA coordination points. Pre-stage contacts. Decide which cases route where. Run one containment scenario with the people who would actually do the work. Speed comes from rehearsal more than heroics. 

Albert and MDBR deserve special attention. Many programs treat them like utilities that simply work. Confirm your renewal path and timeline. If you will keep them through MS-ISAC, start the contract process early. If you plan to pivot, test the alternative before you need it. Protective DNS and network telemetry are the kind of plumbing that only gets noticed when it fails. 

Finally, mind the people side. The loss of centrally funded onboarding, account management, and training creates a maturity gap for new or smaller programs. Consider statewide or regional umbrella memberships to keep the edge of your ecosystem from fraying. A small county that stays inside the network helps the whole state. A small county that drops out becomes the soft point in every regional attack path. 

The signal for leaders is simple. You are not losing the mission. You are changing how it’s paid for and delivered. The winners will inventory dependencies, make deliberate membership choices, use CISA services with intent, and lock continuity in before renewal cliffs show up. 

Key Dates on the Horizon

Think in seasons rather than single days on a calendar. Early March 2025 marked the first visible turn when funding for ten MS-ISAC work categories went away. The end of the cooperative agreement on September 30, 2025 formalized the shift. Everything after that is execution and continuity. Most organizations will feel the change in procurement windows, budget hearings, and renewal gates, not as headlines. 

Mark fiscal gates first. If your fiscal year resets in July, you likely build budgets in the spring and place contracts in early summer. If you run on a calendar year, your window lands in the fall. Put Albert and MDBR on that timeline. Add the next state and local cybersecurity grant cycle to your planner. Even if grants can’t buy MS-ISAC memberships, they can fund projects that make your stack sturdier: identity, logging, exposure reduction, and tabletop exercises. 

Mark operational rhythms next. Schedule quarterly intelligence and incident-response readouts so leadership can see the effect of your choices. If you keep MS-ISAC membership, show the gain in speed and context. If you build an alternative mix, show how CISA services and commercial tools plug specific gaps. Put a midyear review on the calendar to test assumptions before renewal dates sneak up on you. 

Do not forget the human cadence. New staff need onboarding and playbooks. Regional partners need to confirm who calls whom when alerts pop. Put one joint exercise on the board each quarter. Real muscle memory comes from repetition, not from slide decks. 

What to Expect from CISA and from MS-ISAC 

From CISA expect direct help to remain the headline. Grants will continue to push programs toward measurable outcomes. Free services like Cyber Hygiene scanning, phishing assessments, and vulnerability management will remain the easiest on-ramps for smaller teams. Regional advisors stay the connective tissue that turns national guidance into local action. Regular SOC calls and federal incident coordination give you a dependable backstop when things heat up. The signal is steady. Fewer subsidies. More hands-on assistance. More pressure to show progress against performance goals. 

Expect more clarity in how joint advisories are packaged. Collaboration with MS-ISAC continues, which means shared alerts and products keep coming. The practical difference is that member-only details will travel through MS-ISAC channels while broad guidance continues on public CISA platforms. Build your intelligence workflow so both streams land in the same place inside your SOC and get triaged the same way. 

From MS-ISAC expect the membership experience to sharpen. Tiers will mature. Service catalogs will read cleaner. Pricing and terms will normalize as statewide umbrellas and regional cost-shares take hold. The core promise remains the same: better context, faster confirmation, and surge help when it counts. The way you buy it and prove its value to budget offices changes. Expect heavier use of outcomes language in proposals and renewals: reduced time to triage, fewer high-severity tickets with long dwell, faster remediation of exposure identified by scans. You will be asked to show the work. 

Albert and MDBR will remain quiet workhorses that keep you out of the news. Treat them like utilities and give them the respect utilities deserve. Confirm contract paths. Decide who monitors what. If you add endpoint telemetry or deeper network analytics, make sure signal correlation is a present feature rather than a future project. When you do not plan this, tools compete instead of cooperate. 

Equity measures will matter. MS-ISAC leadership has signaled discounts and waivers for the smallest jurisdictions. States that step in with umbrella models will keep rural counties and small towns inside the network. That helps everyone. Threat actors exploit the softest edge of a region. You want that edge covered, even if it needs help to pay. 

Gaining Ground

This is not the story of a lifeline being cut. It is the story of a lifeline being rewired. The federal purchase order that sat between you and MS-ISAC is gone. In its place you have a menu and a coach. Choose the membership tier that fits your risk and budget. Use CISA services to harden everything around it. Plan renewals before they become emergencies. Exercise the plan until it feels routine. 

Do those things and you won’t lose ground. You will gain it. Your intelligence will arrive in a form your SOC can act on. Your incident plan will include real humans with names and phone numbers. Your sensors and protective DNS will renew on purpose rather than luck. Your grant dollars will move needles you can measure. Your smallest partners will stay inside the tent, which keeps the whole state safer. 

If you want a grounded plan that turns these policy changes into resilient, real-world operations, consult with the experts at NuHarbor.

MS-ISAC

Don't miss another article. Subscribe to our blog now. 

Subscribe now

 

Included Topics

  • Industry Insights,
  • Security Operations
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Industry Insights 4 min read
When the Attorney General’s Office Goes Dark: Lessons from Pennsylvania’s Cyberattack
When the Attorney General’s Office Goes Dark: Lessons from Pennsylvania’s Cyberattack
Read More
Industry Insights 4 min read
What the Federal Courts Breach Means for Public Sector Cybersecurity
What the Federal Courts Breach Means for Public Sector Cybersecurity
Read More
Industry Insights 12 min read
The First 101 Days as a New Chief Information Security Officer: A CISO Roadmap Playbook
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.