Skip to main content


What We Do And What We Protect

Oklahoma Cyber Command is charged with protecting state users and their devices, networks, data and applications from malicious intent. The OMES Information Services supports Cyber Command in their objectives. Oklahoma Cyber Command’s top priority is safeguarding the state’s data and computer infrastructure against unauthorized data use, disclosure, modification, damage and loss.

The Office of Management and Enterprise Services Information Services division supports Cyber Command’s vision to provide leadership in the development, delivery and maintenance of cybersecurity, information security risk management and information security auditing programs.

Resiliency Strategy

  • Prevent attacks wherever possible.
  • Respond rapidly.
  • Return operations quickly.
  • Manage negative outcomes.
  • Learn from attacks.
  • Return stronger and more prepared.


  • Protect Oklahoma's information assets and maximize access to data.
  • Develop robust and collaborative risk reduction and management strategies.
  • Advance statewide approach to cybersecurity, privacy and compliance.
  • Foster security- and risk-minded culture throughout Oklahoma's workforce.

How We Protect

  • Identify – develop organizational understanding of managing cybersecurity risk to systems, people, assets, data and capabilities.
  • Protect – establish appropriate safeguards to ensure delivery of critical infrastructure services.
  • Detect – monitor cybersecurity events and verify effectiveness of protective measures.
  • Respond – manage appropriate response to cybersecurity incidents.
  • Recover – maintain plans for resilience and restore capabilities or services impaired by a cybersecurity incident.

Cyber Command Security Operations Center

The Cyber Command Security Operations Center monitors network traffic and reacts to threats. Intelligence feeds signal suspicious network activity by known “bad actors,” and the statewide security software allows personnel to determine when the system is compromised.

The Security Operations Center protects mission-critical networks 24/7/365. Staff responds to hackers, viruses, spam-email campaigns and anything that threatens the security of the state’s technology infrastructure. The benefits include:

  • Efficient and cost-effective security monitoring.
  • Rapid response to security incidents.
  • Zero time and cost associated with testing software updates.
  • Employees focus on core mission while we focus on security.
  • Secure data.
  • Reliability.
  • Peace of mind.
Last Modified on Jan 25, 2023
Back to Top