On February 17, 2026, the UC Berkeley Center for Long-Term Cybersecurity (CLTC) announced a significant new initiative to strengthen grassroots cybersecurity across the United States. The CLTC will partner with several states to co-host three regional Cyber Civil Defense Summits in 2026. These events are designed to foster collaboration among a diverse group of stakeholders, including volunteer cybersecurity groups, local government officials, academic institutions, and emergency responders. The core mission is to develop and share effective, replicable strategies for protecting vulnerable and under-resourced community organizations such as schools, hospitals, and local critical infrastructure from cyberattacks. The initiative is a follow-up to the CLTC's 2025 'Roadmap to Community Cyber Defense' and represents a major push towards a whole-of-state approach to cyber resilience.
The Cyber Civil Defense initiative recognizes that while federal and corporate entities have significant cybersecurity resources, local community pillars are often left vulnerable. The regional summits aim to bridge this gap by:
This initiative has the potential for significant positive impact:
This initiative aligns with the broader national cybersecurity strategy, which emphasizes the importance of public-private partnerships and a whole-of-society approach to defending against cyber threats. It provides a practical framework for implementing the principles laid out in directives from agencies like the Cybersecurity and Infrastructure Security Agency (CISA), which call for increased collaboration to protect critical infrastructure and State, Local, Tribal, and Territorial (SLTT) governments.
Organizations and individuals interested in participating in or supporting the Cyber Civil Defense movement should:
A core component of community defense is training staff at local organizations on cybersecurity best practices.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats