CISO Decoded: Listing the U.S. State CISOs Safeguarding Public and Private Systems

Published
Written by:
Vishwa Pandagle
Vishwa Pandagle
Cybersecurity Staff Editor

Why do we need defenses? We have gatekeepers. We have gates for protection, which implies that there is something that intrudes upon us.

The intrusion targets not just people but data related to people, health, finances, and national security. It is manipulated to extort and impersonate for further exploitation, which seeks defenders of the state. 

The United States of America appoints CISOs for its states, which gives them not only the responsibility of monitoring cybersecurity but also allows faster response to threats.

In this series, we spotlight the CISOs who defend both government and enterprise systems, from the 50 U.S. state cybersecurity leaders to the organizational CISOs responsible for protecting business networks and guiding incident response.

They form a team of countless defenders, including analysts, engineers, threat hunters, researchers, and policy leaders. And work closely with state IT teams, technology leaders, public-safety agencies, federal cybersecurity partners, and local governments following their duty of safeguarding data and trust.

We are committed to bringing their mission up via our platform to not just to celebrate their diligence but also to create greater awareness about cybersecurity, threat landscape, and incident response.

Here are all 50 U.S. States along with their CISOs:

CISO Deocded - CISOs of US States Infographics
Sr. No. State CISO
1 Alabama Chad Smith
2 Alaska Dan Monarch
3 Arizona Ryan Murray
4 Arkansas Gary Vance
5 California Vitaliy Panych
6 Colorado Jill Fraser
7 Connecticut Gene Meltser
8 Delaware Aashish Patel
9 Florida Jason Walker (Interim)
10 Georgia Steve Hodges
11 Hawaii Vincent Hoang
12 Idaho Jerred Edgar
13 Illinois Jason Bowen
14 Indiana Hemant Jain
15 Iowa Shane Dwyer
16 Kansas John Godfrey
17 Kentucky David J. Carter
18 Louisiana Chase Hymel
19 Maine Charles Rote
20 Maryland James Saunders
21 Massachusetts Anthony J. O’Neill
22 Michigan Jayson Cavendish
23 Minnesota John Israel
24 Mississippi Jay White
25 Missouri Shawn Ivy
26 Montana Chris Santucci
27 Nebraska Abby Eccher-Young
28 Nevada Deron Dahl (Interim)
29 New Hampshire Ken Weeks
30 New Jersey Michael Geraghty
31 New Mexico Raja Sambandam
32 New York Chris Desain
33 North Carolina Bernice Russell-Bond
34 North Dakota Chris Gergen
35 Ohio Holly Drake
36 Oklahoma Daniel Langley
37 Oregon Ben Gherezgiher
38 Pennsylvania James Sipe
39 Rhode Island Nathan Loura
40 South Carolina Ben Willis
41 South Dakota Jonathan Hampe
42 Tennessee Curtis Clan
43 Texas Tony Sauerhoff
44 Utah Phil Bates
45 Vermont John Toney
46 Virginia Michael Watson
47 Washington Ralph Johnson
48 West Virginia Leroy J Amos
49 Wisconsin William (Bill) Brinkley
50 Wyoming Miguel Angel Penaranda

We want to build a community that reflects every part of the CISO experience. The goal is to understand how they work, because having security systems is not enough. There is still a need for clear awareness. People should know what a CISO and other defenders do, why their decisions matter, and how to communicate with them so they can protect data effectively.

CISO Decoded was created to bridge that gap. In this series, we speak with security leaders to show how they approach their work in real environments, what they prioritize, and how those decisions shape the security of organizations and governments. 

We explore how CISOs across enterprises, state agencies, and national infrastructures defend systems that hold the most sensitive data people trust them with.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: