IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Missouri CISO Discusses Sustainable, State-Led Cybersecurity

Chief Information Security Officer Shawn Ivy said that his state maintains a self-reliant framework through dedicated funding, layered defenses and deliberate preparation for emerging technologies.

The Missouri Capitol building illuminated at night.
Missouri continues to build a sustainable, state-driven cybersecurity program that is designed to withstand a rapidly shifting federal and technological landscape, state CISO Shawn Ivy recently told Government Technology.

Shawn Ivy, Missouri state CISO
Missouri CISO Shawn Ivy
(State of Missouri)
Ivy described the state’s cybersecurity approach as a layered defense built on zero-trust principles while keeping an eye toward artificial intelligence and quantum computing, doing so in an email interview. A 30-year public servant, Ivy has been the state CISO dating back to June 2024, working out of the Missouri Office of Administration’s Information Technology Services Division.

“Cybersecurity is a continuous journey, and with continued support via appropriated funds, we are committed to enhancing our tool sets to meet emerging challenges,” he said. “Our focus on advancing the use of artificial intelligence for both offensive and defensive measures is crucial, as is our preparation for the encryption challenges posed by quantum computing.”

Ivy said security is embedded throughout state operations, too.

“Complete protection cannot rest on a single tool or partner," he said, "we integrate security into every process, focusing on vital layers such as physical, perimeter, network, endpoint, application, data, identity and the human element.”

The division has previously highlighted identity and access management as part of its broader IT modernization efforts, aligning with those he described.

His team conducts regular assessments and tabletop exercises based on the National Institute of Standards and Technology frameworks to help identify and close gaps. They provide security awareness training, and they also share information about artificial intelligence and its role in social engineering. On top of that, they share cybersecurity intelligence with partners.

The division operates as a centralized IT provider for the executive branch, and the state legislature provides a dedicated cybersecurity budget. Ivy said that while the state uses some federally funded services, their overall impact has been limited.

He added that the layered security approach helps maintain protection even as no-cost services end, and staff continues to monitor federal developments that could influence state-level cyber programs. These include changes within the Cybersecurity and Infrastructure Security Agency organization as well as the State and Local Cybersecurity Grant Program.

Emphasizing relationships as a starting point for stronger cybersecurity, Ivy encouraged peers to engage with colleagues and stakeholders, and to "cultivate a culture of continuous improvement within your organization."
Rae D. DeShong is a Texas-based staff writer for Government Technology and a former staff writer for Industry Insider — Texas. She has worked at The Dallas Morning News and as a community college administrator.