Skip to main content


Compliance enforces controls established by regulations, law or industry standards that are designed to protect the confidentiality, integrity and availability of data.

Privacy strives to minimize adverse consequences for individual privacy and ensure compliance with privacy regulations by addressing policies and procedures, advising on risk and mitigation and providing support in the event of a privacy incident.

Defense Engineering designs, implements and enhances cyber defenses that proactively prevent or disrupt cyber threats across all supported State of Oklahoma agencies.

Defense Operations maintains and operates cyber defenses that protect Oklahoma's information assets and supports Cyber Command and OMES IS engineering efforts.

Hunt and Incident Response Team (HIRT) offers resiliency to the State of Oklahoma by providing the personnel and platforms necessary to detect, interdict and mitigate advanced cybersecurity, physical security and fraudulent activity threats.

Cyber Operations is responsible for around the clock monitoring, detecting, investigating and responding to cyber threats against State of Oklahoma technology systems.

Oklahoma Information Sharing and Analysis Center (OK-ISAC) is responsible for connecting members across Oklahoma to share cyber threat intelligence and improve cyber resilience at all levels of participation—local, regional and national—with enhanced information sharing across the state.

Last Modified on Jan 25, 2023
Back to Top