What State and Local Leaders Need to Know
For twenty years, MS-ISAC functioned like the public sector’s neighborhood watch with a direct line to the patrol car. It delivered federally underwritten threat intelligence, kept Albert sensors humming in the background, and provided a SOC that answered the phone at two in the morning. That comfort came from a long-running cooperative agreement between CISA and the Center for Internet Security, which operates MS-ISAC. At the close of FY25, that agreement reached its planned finish. CISA didn’t drop the mission; it changed how it supports it, emphasizing grants, no-cost tools, performance goals, and hands-on expertise delivered directly to state, local, tribal, and territorial partners.
What Changed and What’s Still Available
The turn was visible months before fiscal year-end. In early March, the federal government pulled funding for ten MS-ISAC work categories. The cuts hit high-touch items that smaller programs leaned on; tailored threat analysis and distribution, around-the-clock incident response and SOC surge, member onboarding and account management, and the training and outreach that kept newer teams moving in step. CIS bridged pieces of this through the end of the fiscal year, but those measures were temporary.
To stay sustainable without federal underwriting, MS-ISAC adopted a tiered, fee-based membership model. Pricing is keyed to the supported portions of an organization’s operating budget, with discounts or waivers for jurisdictions that truly cannot pay. The tent is still large; the difference is you now choose your seat and share the cost of the canvas.
Some services continued through September 30 under the expiring agreement. Albert Network Monitoring and Management stayed in place. MDBR protective DNS kept blocking known bad domains. Routine advisories still went out. After that date, access becomes a membership or contracting question. If Albert is part of your detection backbone, you should already be coordinating directly with MS-ISAC on coverage and renewals.
CISA didn’t leave the field, it moved positions. Instead of paying MS-ISAC to do a broad set of things for everyone, CISA is leaning into what it can deliver at national scale with local impact. That means grants through state, local, and tribal programs; no-cost technical services such as Cyber Hygiene scans, phishing assessments, and vulnerability management; practical frameworks like the Cybersecurity Performance Goals and tools to assess against them; and human help via regional advisors, SLTT coordinators, bi-monthly SOC calls, and federal incident-response coordination. CISA also says collaboration with MS-ISAC continues. Joint advisories and information sharing still happen, just bundled differently.
What moved behind the MS-ISAC paywall are the high-touch pieces: tailored cyber threat intelligence with actionable context, 24×7 SOC and incident surge, member enablement and account management, training, and working groups. Outside the paywall, CIS continues to publish some TLP: CLEAR advisories, and the broader CIS ecosystem maintains free resources like Benchmarks and baseline tools. Yesterday’s prepaid buffet is now a menu. You’ll still eat well if you plan your order and budget.
Why Leaders Should Care and What It Means for You
If you run technology for a state agency, a county, a city, or a large public institution, your operating model just shifted. Yesterday you leaned on MS-ISAC for curated intel, after-hours help, and structured enablement without a local procurement step. Today you decide what remains through membership, what you replace with alternatives, and what CISA covers with free services. This is not a crisis. It’s a budgeting and operations change that rewards planning.
Start with risk. The most expensive losses after a funding pivot appear in the quiet space between awareness and action. If your intelligence pipeline gets thinner or slower, your SOC spends more time triaging noise and less time closing real findings. If surge support isn’t on tap, containment stretches and dwell time grows. Small and rural teams feel this first because they counted on MS-ISAC for context, coaching, and quick reinforcement. The fix is clarity. Write down who provides what on Monday morning and make sure those answers are real.
Address money next. Membership preserves the high-touch parts of MS-ISAC, which means a line item. Grants remain powerful, but current rules don’t let you buy MS-ISAC or EI-ISAC memberships with SLCGP funds. Use those dollars to harden the things that make membership more valuable: raise the floor on identity, clean up logging and log routing, strengthen endpoint visibility, and fund tabletop exercises that involve the people who will actually respond. The outcome you want is a stack that performs even if one piece hiccups.
Operations will feel different. Threat intelligence that used to arrive with local context may now come from a mix of MS-ISAC products, CISA advisories, commercial feeds, and state shared services. That means you need an internal intelligence rhythm. Decide who collects, who triages, and who tasks the work. Establish a weekly cadence so your SOC knows which signals become detections, hunts, or hands-on checks. The better the drumbeat, the less you worry about who played the original notes.
Incident response needs a grown-up plan. If you rely on MS-ISAC for round-the-clock surge, membership likely makes sense. If you do not, line up a retained IR partner and refresh your playbooks with clear CISA coordination points. Pre-stage contacts. Decide which cases route where. Run one containment scenario with the people who would actually do the work. Speed comes from rehearsal more than heroics.
Albert and MDBR deserve special attention. Many programs treat them like utilities that simply work. Confirm your renewal path and timeline. If you will keep them through MS-ISAC, start the contract process early. If you plan to pivot, test the alternative before you need it. Protective DNS and network telemetry are the kind of plumbing that only gets noticed when it fails.
Finally, mind the people side. The loss of centrally funded onboarding, account management, and training creates a maturity gap for new or smaller programs. Consider statewide or regional umbrella memberships to keep the edge of your ecosystem from fraying. A small county that stays inside the network helps the whole state. A small county that drops out becomes the soft point in every regional attack path.
The signal for leaders is simple. You are not losing the mission. You are changing how it’s paid for and delivered. The winners will inventory dependencies, make deliberate membership choices, use CISA services with intent, and lock continuity in before renewal cliffs show up.
Key Dates on the Horizon
Think in seasons rather than single days on a calendar. Early March 2025 marked the first visible turn when funding for ten MS-ISAC work categories went away. The end of the cooperative agreement on September 30, 2025 formalized the shift. Everything after that is execution and continuity. Most organizations will feel the change in procurement windows, budget hearings, and renewal gates, not as headlines.
Mark fiscal gates first. If your fiscal year resets in July, you likely build budgets in the spring and place contracts in early summer. If you run on a calendar year, your window lands in the fall. Put Albert and MDBR on that timeline. Add the next state and local cybersecurity grant cycle to your planner. Even if grants can’t buy MS-ISAC memberships, they can fund projects that make your stack sturdier: identity, logging, exposure reduction, and tabletop exercises.
Mark operational rhythms next. Schedule quarterly intelligence and incident-response readouts so leadership can see the effect of your choices. If you keep MS-ISAC membership, show the gain in speed and context. If you build an alternative mix, show how CISA services and commercial tools plug specific gaps. Put a midyear review on the calendar to test assumptions before renewal dates sneak up on you.
Do not forget the human cadence. New staff need onboarding and playbooks. Regional partners need to confirm who calls whom when alerts pop. Put one joint exercise on the board each quarter. Real muscle memory comes from repetition, not from slide decks.
What to Expect from CISA and from MS-ISAC
From CISA expect direct help to remain the headline. Grants will continue to push programs toward measurable outcomes. Free services like Cyber Hygiene scanning, phishing assessments, and vulnerability management will remain the easiest on-ramps for smaller teams. Regional advisors stay the connective tissue that turns national guidance into local action. Regular SOC calls and federal incident coordination give you a dependable backstop when things heat up. The signal is steady. Fewer subsidies. More hands-on assistance. More pressure to show progress against performance goals.
Expect more clarity in how joint advisories are packaged. Collaboration with MS-ISAC continues, which means shared alerts and products keep coming. The practical difference is that member-only details will travel through MS-ISAC channels while broad guidance continues on public CISA platforms. Build your intelligence workflow so both streams land in the same place inside your SOC and get triaged the same way.
From MS-ISAC expect the membership experience to sharpen. Tiers will mature. Service catalogs will read cleaner. Pricing and terms will normalize as statewide umbrellas and regional cost-shares take hold. The core promise remains the same: better context, faster confirmation, and surge help when it counts. The way you buy it and prove its value to budget offices changes. Expect heavier use of outcomes language in proposals and renewals: reduced time to triage, fewer high-severity tickets with long dwell, faster remediation of exposure identified by scans. You will be asked to show the work.
Albert and MDBR will remain quiet workhorses that keep you out of the news. Treat them like utilities and give them the respect utilities deserve. Confirm contract paths. Decide who monitors what. If you add endpoint telemetry or deeper network analytics, make sure signal correlation is a present feature rather than a future project. When you do not plan this, tools compete instead of cooperate.
Equity measures will matter. MS-ISAC leadership has signaled discounts and waivers for the smallest jurisdictions. States that step in with umbrella models will keep rural counties and small towns inside the network. That helps everyone. Threat actors exploit the softest edge of a region. You want that edge covered, even if it needs help to pay.
Gaining Ground
This is not the story of a lifeline being cut. It is the story of a lifeline being rewired. The federal purchase order that sat between you and MS-ISAC is gone. In its place you have a menu and a coach. Choose the membership tier that fits your risk and budget. Use CISA services to harden everything around it. Plan renewals before they become emergencies. Exercise the plan until it feels routine.
Do those things and you won’t lose ground. You will gain it. Your intelligence will arrive in a form your SOC can act on. Your incident plan will include real humans with names and phone numbers. Your sensors and protective DNS will renew on purpose rather than luck. Your grant dollars will move needles you can measure. Your smallest partners will stay inside the tent, which keeps the whole state safer.
If you want a grounded plan that turns these policy changes into resilient, real-world operations, consult with the experts at NuHarbor.
Don't miss another article. Subscribe to our blog now.
Included Topics
Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.