Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Cybersecurity Policy Equity for Rural and Underserved Communities

Rubrik
03/12/2026
41
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Traditional reimbursement-based cybersecurity funding disadvantages rural and low-income communities that lack upfront capital, requiring a shift toward grants and proactive investment models similar to natural disaster preparedness.
  • Cybersecurity workforce development should focus on creating regional nodes that allow people to protect their own communities rather than concentrating talent in major metropolitan areas, which causes brain drain from underserved states.
  • The ripple effects of cyberattacks on healthcare systems in rural areas are particularly severe, as patients may need to travel long distances to alternative facilities during recovery periods that can last months.
  • Effective cyber policy advocacy starts with engaging your congressional representatives—everyone has two senators and one House member who can escalate issues directly to federal agencies.
  • Skill-based hiring and reduced credential requirements can help address the 500,000 open cybersecurity positions while diversifying the workforce geographically and socioeconomically.
  • Cyber policy engagement should not be optional based on political party—advocates must work with whoever is in power while maintaining clear proactive priorities alongside defensive responses.

This episode of Rubrik's Data Security Decoded podcast features an in-depth conversation between Travis Rosiek, Rubrik's Public Sector CTO, and Nicole Tisdale, a distinguished national security policy expert who served as Director of Legislative Affairs for the National Security Council at the White House. Nicole shares her remarkable journey from the small town of Nettleton, Mississippi—a community of 2,000 people with no traffic light—to shaping some of the nation's most significant cybersecurity policies, including the $1 billion cybersecurity grant program and the first federal cyber incident reporting law. The discussion centers on a critical but often overlooked aspect of cybersecurity: the policy gaps that leave rural and underserved communities vulnerable to cyber threats. Nicole explains how traditional reimbursement-based funding models work well for wealthy municipalities like San Francisco but fail communities in states like Mississippi and West Virginia that lack upfront capital. She advocates for proactive policy approaches including grants and low-interest loans that provide resources before incidents occur, drawing parallels to natural disaster preparedness. A significant portion of the conversation addresses workforce development challenges. Nicole argues that the cybersecurity industry's concentration in major metropolitan areas creates a brain drain from rural states, perpetuating economic disadvantage while leaving local critical infrastructure unprotected. She proposes regional workforce nodes that would allow people to protect their own communities while building economic stability, noting that CISA's mission to protect all critical infrastructure means that infrastructure in Tupelo, Mississippi deserves the same protection as assets in major cities. The episode also explores the ripple effects of cyberattacks on healthcare systems in underserved areas, where patients may need to travel significant distances to alternative facilities. Nicole emphasizes that recovery—not just incident response—deserves more attention in policy discussions. She concludes with practical advocacy advice, encouraging listeners to engage with their congressional representatives as an effective entry point for influencing cyber policy, regardless of which political party holds power.

Chapters

0:00 - Introduction and Opening
1:30 - Nicole's Background and Journey
3:33 - Advocacy for Underserved Communities
5:36 - Policy Impact on Rural Areas
6:36 - Funding Models and Their Limitations
24:49 - Regional Workforce Development
26:10 - Economic Stability and Community Protection
28:21 - Job Requirements and Barriers to Entry
30:05 - Healthcare Cyberattack Impacts
49:53 - Effective Policy Advocacy Strategies
55:59 - Optimism About Cybersecurity's Future

Key Quotes

0:00 "We have to provide funding to our state and locals who operate most of our critical infrastructure before they need it. In the same way that we don't wait to start preparing for natural disasters until after the natural disaster happens, we have to do the same thing with cybersecurity."
4:46 "People were making policies without having us in mind, but the policies were impacting us."
6:53 "That works in San Francisco. That may even work in Austin, Texas. It doesn't work in places like Mississippi and West Virginia, because a lot of these states don't have the money to put up front."
25:41 "That infrastructure exists in Nettleton, Mississippi. It exists in Tupelo, Mississippi. How do we make it easier for people to serve their communities where they are? ..."
28:28 "Some of these job requirements, they have everything except requiring you to have a specific Zodiac sign. And it's like, come on, y'all. We don't need to be that specific."
50:31 "You cannot opt out of cyber policy until and unless the party you support is in charge. That is not an effective way to do public policy."
Categories:
  • » Webinar Library » Rubrik
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • cybersecurity policy
  • rural communities
  • workforce development
  • cyber resilience
  • healthcare cybersecurity
  • critical infrastructure protection
  • policy advocacy
  • underserved communities
  • federal funding models
  • skill-based hiring
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cybersecurity Policy Equity for Rural and Underserved Communities

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version