SLED Cybersecurity · tec-refresh.com/sled

Cybersecurity Built for
State, Local & Education

California's public agencies, school districts, and municipalities face escalating threats — and federal compliance mandates that can't be ignored. Tec-Refresh helps SLED organizations get prepared before the world arrives.

Aligned to CMMC 2.0 CISA KEV Directives NIST CSF 2.0 MS-ISAC
9/10
Attacks target Active Directory
140+
Incidents at 2024 Paris Olympics
72%
SLED orgs lack tested AD recovery
2026
California hosts the world

Source: CISA, Semperis, 2024 Paris Olympics cybersecurity report.

The Threat Landscape Has Changed

Nation-state actors and ransomware groups increasingly target public-sector organizations — not despite limited resources, but because of them. Volt Typhoon and other advanced threat groups have already established persistence inside U.S. critical infrastructure.

0
Cyberattacks target Active Directory as the primary vector
0
Cyber incidents during the 2024 Paris Olympics
0
Of SLED organizations lack a tested AD recovery plan
0
Major global events in California 2026–2028

Ransomware Targeting Public Agencies

Municipal governments and school districts remain top ransomware targets due to sensitive citizen data, legacy infrastructure, and operational dependencies on continuous service.

Volt Typhoon & Nation-State Persistence

CISA has confirmed Volt Typhoon pre-positioned within U.S. critical infrastructure. State and local agencies running utilities and emergency services are directly in scope.

Identity Infrastructure at the Core

Active Directory is the backbone of most public-sector environments — and the primary attack path. Compromise of AD means compromise of everything connected to it.

Global Events Amplify Exposure

Super Bowl LX, FIFA World Cup 2026, and LA 2028 bring unprecedented attention to California — and coordinated threat actor activity targeting public infrastructure.

CMMC + CISA — What SLED Organizations Need to Know

Federal compliance frameworks are no longer optional for public-sector organizations. CMMC 2.0 and CISA’s Known Exploited Vulnerabilities directives create real obligations — and real liability for organizations that aren’t prepared.

CMMC 2.0
Cybersecurity Maturity Model Certification

CMMC 2.0 applies to any organization handling Controlled Unclassified Information — including state agencies, local governments, and educational institutions with federal contracts or grants.

3-level model: Foundational, Advanced, Expert
Level 2 requires third-party C3PAO assessment
110 NIST SP 800-171 practices to implement
Non-compliance risks federal contract eligibility
CISA KEV Directives
Known Exploited Vulnerabilities Catalog

CISA’s Binding Operational Directives mandate federal agencies remediate known exploited vulnerabilities within strict timelines. State and local agencies are strongly encouraged — and in many states required — to comply.

BOD 22-01 covers all federal civilian agencies
CISA urges SLED adoption of KEV remediation timelines
MS-ISAC provides free resources for state/local orgs
Failure to patch KEVs = high breach probability

Know Where You Stand.
Get a Roadmap to Get There.

The Preparedness & Identity Resilience Assessment is a structured evaluation of your organization’s readiness for identity-based attacks and operational disruption. Delivered by Tec-Refresh, with Semperis supporting identity infrastructure components.

Assessment spots are limited. Tec-Refresh is working with Southern California SLED organizations through Q2 and Q3 2026.

Request Your Assessment →
How it works
1
Schedule
Connect with a Tec-Refresh advisor. Most assessments begin within two to three weeks.
2
Assessment
Our team evaluates your identity infrastructure, NIST CSF 2.0 alignment, and threat exposure. Remote or on-site.
3
Deliverables
Receive your Executive Risk Report, NIST Heatmap, and Remediation Roadmap within two to three weeks.
01
Executive Risk Report
Written for C-suite and board audiences. Clear findings, business impact framing, and actionable priorities — no technical jargon.
02
NIST CSF 2.0 Alignment Heatmap
A visual gap analysis across all five CSF 2.0 functions — Identify, Protect, Detect, Respond, Recover — current vs. target state.
03
Prioritized Remediation Roadmap
A sequenced 90-day, 6-month, and 12-month action plan by risk severity. Know what to fix, in what order, and why.

From the World Stage Series

Blog · May 2026 · SLED

SLED Cybersecurity 101: CMMC, CISA Directives, and What Agencies Actually Need

A practical breakdown of the federal compliance mandates shaping public-sector cybersecurity — what CMMC 2.0 and CISA KEV directives mean for state agencies, school districts, and municipalities, and where to start.

Read the article →

Identity Under Siege — Webinar

Hosted by Miguel Martinez (Tec-Refresh CTO) and Sean Deuby, Principal Technologist at Semperis. On-demand — get notified when it’s live.

Get Notified →

Request Your Free Cyber Assessment

A Tec-Refresh advisor will be in touch within one business day to discuss your organization’s needs and confirm next steps.

No obligation
The assessment conversation is free. We scope together before anything begins.
Three concrete deliverables
Executive Risk Report, NIST CSF 2.0 Heatmap, and Prioritized Remediation Roadmap.
Southern California focus
Tec-Refresh is based in Newport Beach, CA, serving SLED organizations across the region.
Your data stays private
Tec-Refresh does not sell or share contact information. Used only to follow up on your request.
SLED Assessment Request

CMMC 2.0 · CISA KEV · NIST CSF 2.0 · WorldStage2026