
With new cyber threats emerging every day, ICMA has partnered with the National Association of Counties (NACo) to strengthen local governments’ cybersecurity efforts. The Cybersecurity Collaborative will provide members of ICMA with access to top tier technology security professionals, information, intelligence, best practices, and other resources to prepare for, prevent, and mitigate cybersecurity threats.
About the ICMA Cybersecurity Collaborative
The ICMA Cybersecurity Collaborative increases the access to information, intelligence, best practices, and resources that creates an agile, cooperative ecosystem. The collective purpose of this network is to proactively strengthen America’s counties, cities, towns, and villages to better defend and protect their constituents from cyberattacks by connecting the private and public sectors together. In partnership with NACo, we seek to deliver the Cybersecurity Collaborative across the country to address cybersecurity as a cohesive community. This community currently includes chief information security officers (CISOs) from industry leading companies such as JPMorgan, IBM, McDonalds, and Aflac; former CISOs from Verizon, Grant Thornton, and Kellogg’s, as well as a growing number of county and city participants.
ICMA Cybersecurity Collaborative Partnership Merits
- Serves to extend the ICMA mission while making members smarter, stronger, better equipped, and better prepared for cybersecurity incidents.
- Provides critical news, intelligence, training, events, and other cyber-risk resources.
- Engages the community on the subject of cybersecurity.
- Provides access to a trusted network of peers.
Features of the Platform
- Daily security news and security alert portal.
- Peer‐to‐peer exchange through community discussion.
- Real‐time security task forces and SWAT teams.
- Online training, webinars, and live tech demos.
- Security research and report repository.
- Membership directory.
Benefits of the Cybersecurity Collaborative
- Task Force Working Groups: Member-only Collaboration to develop tools and solutions free of vendor or analyst influence
- CISO Rapid Response: On-Demand collaboration with CISOs to help you solve your most pressing challenges including secure direct messaging
- Tool & Policy Library: CISO developed tools and policies to develop and strengthen your security program
- Morning Security Reports: Real-time situational awareness curated and emailed to members every morning free of ads
- Virtual Briefings & CISO Boardrooms: Closed-door, private briefings with CISOs and national security leaders for unique insights on threats, policy, and solutions
- Leadership Development Program: 12-week program developed in partnership with General Colin Powel and the Professional Development Academy
Sign Up to Receive More Information
Cybersecurity Webinar Series Recordings
Reducing Third Party Cyber Risk in Local Government
Date: June 23, 2021
------------
NACo Cybersecurity Guidance for Local Government
Date: August 18, 2021
Cybersecurity Resources
Planning for 2020 Cyber Attacks: Are You Ready?
Checklist: Keep Your Remote Workforce Safe from Cyberthreats
A Look at Local Government Cybersecurity in 2020
Cybersecurity Considerations to Implement IoT
Cyber Continuity Planning: Go Big or Go Home
Testimonials
“I think the Collaborative is the best source of information and resources I have access to. Plus, as a member, my staff gets access to all the information as well. The 6:00 am feeds are faster than MSISAC, USCERT and routinely more informative. The people you get access to are phenomenal and the leadership academy is great as well.” - Michael Dent, CISO, Fairfax County
“Bring Your Own Device has been a big challenge for us. We joined the Cybersecurity Collaborative and they immediately provided me a set of guidelines and a checklist for how to implement BYOD. The document was Best of Breed output from a task force that a group of Fortune 1000 security teams created. I was able to use this without needing to spend the time and money it would have taken to (re)create the wheel myself.” - Raghu Seshadri, Director of Information Technology, Jefferson County Public Schools


The ICMA Cybersecurity Leadership Program is a 12-week mentorship based collaborative readiness program led by CISOs and other experts who deliver their proven frameworks and insights on how to lead and secure a network and an organization – protecting data assets and the enterprise brand. This program coaches participants on what it means to think and act as a cybersecurity leader.
![]()
As ICMA’s research has demonstrated, local governments of all sizes are susceptible to cyberthreats and must actively prepare for these threats with cybersecurity investments. This leadership development program prepares existing and emerging leaders to better defend their most critical assets.
— MARC OTT, ICMA Executive Director
What are the objectives of the program?
KNOWLEDGE AND ABILITIES GAP | COMPETENCY | CISO EXPECTATIONS |
LEADING AND MAKING DECISIONS | LEADING | Execute as a (local government) leader to facilitate, influence, persuade, and negotiate with individuals, teams and groups toward decisions |
PLANNING AND MANAGING CHANGE | ADAPTING | Leverage the power of systems thinking to mitigate risk and empower people during organizational and market fluctuation |
BUILDING STRONG RELATIONSHIPS | COLLABORATING | Establish alignment of individual purpose with team meaning and organizational mission to energize efforts and maximize results |
PRESENTING INFORMATION CLEARLY | COMMUNICATING | Manage messaging based on stakeholder need, sensemaking, and simplicity to create clarity in meaning, confidence, and community |
EXECUTING TO ACHIEVE VALUE FOR YOUR COMMUNITY | DELIVERING VALUE | Focus on projects and processes (and the people associated with them) while linking execution to strategy to deliver value to community |
How is the program structured?
With intentionally designed asynchronous and synchronous activities and rich content and application-focused outcomes, the program takes a whole-solution approach to cybersecurity leadership rather than a focus on siloed activities. You can find the complete course breakdown here.
Here is a list of program activities:
- Breakout Group Meeting – 60-minute meeting (in-person or virtual) amongst breakout group members (typically 10-12 participants).
- Breakout Group Summary – These posts are for the rest of the cohort to see what your breakout group discussed. Each week your breakout group’s designated leader or scribe will write this post which will be seen by the entire cohort.
- Discuss with Breakout Group – Share your thoughts, perspectives and comments with your breakout group. These will be seen by you, your breakout group, and faculty.
- Discuss with Cohort – Share your thoughts, perspectives and comments with your cohort. This is an online threaded discussion and you are expected to engage in with your colleagues. Posts will be seen by all participants and faculty.
- Live Event – 60-minute, virtual meeting conducted via web conference with your entire cohort and facilitated by your faculty mentor.
- Read – Read a document, case study or article.
- Reflect – Your online reflections are your private notes and thoughts. They will only be seen by you.
- Surveys or assessments – You will also receive occasional surveys on the platform for you to answer questions and submit responses that will help you shape your own learning journey and provide us valuable feedback to shape future courses.
- Watch – View a brief video from your faculty presenters.
How does the ICMA Cybersecurity Leadership Program compare to other cybersecurity programs?
What keeps you up at night?
ICMA Cyber Program | University Training | Boot Camp Program | Technical Training | |
Scalable |
![]() |
![]() |
||
Cost Effective |
![]() |
![]() |
||
Mentorship Based Training |
![]() |
![]() |
||
Online |
![]() |
|||
CPE Credits Certified |
![]() |
![]() |
![]() |
![]() |
Non-disruptive |
![]() |
|||
Relevant Content |
![]() |
![]() |
![]() |
|
Fully Integrated Leadership Solution |
![]() |
|||
Expertly Facilitated by PhD |
![]() |
![]() |
||
Capstone Simulated Attack |
![]() |
![]() |
Who Should Attend?
Existing and emerging front-line and mid-level leaders interested in improving their cybersecurity capabilities, team engagement, and organizational outcomes. In addition to IT professionals, this program may also work well for cyber organizational partners in finance, operations, HR, and other disciplines who are interested in learning more about cybersecurity leadership and overall organizational risk management.
What is the Cost of the Program?
RETAIL | ICMA MEMBERS | NON-MEMBERS | |
PRICE | $2,495 | $1,995 | $2,495 |
The retail cost is $2,495 per participant, however ICMA Members pay $1,995 - a 20% discount! Non-ICMA Member fee is $2,495.
Can I count this toward my ICMA Credentialed Manager status?
Yes. ICMA will allow 48 credit hours for this program. In addition, completion of this course can be applied to other credentialing programs--for example SHRM, PMI, and CISSP.
Next Steps...
Whether you'd like more specific information about the program, or you're ready to register now, your next stop is the program registration page.



