Socwise logo
Lesku Gergely
04/04/2025

Colorado Unlocked: Colorado’s Role in Cybersecurity and Innovation

Lesku Gergely
Discover Colorado’s unique blend of high-altitude beauty and cutting-edge cybersecurity. From legal insights to space defense and education, this journey showcases how Colorado is shaping the digital frontier.

About Colorado from our aspects

This state lays nearly in the center of the states and probably it is landscape which is most familiar for many of us from western movies. Beautiful mountains, clear and cold air, rural areas and large cities.

Colorado is a state with a population of 6 million people, making it only the 20th most populated state in the U.S. The capital and largest city is Denver. Geographically, Colorado is incredibly diverse, featuring the Rocky Mountains in the western part, with peaks like Mount Elbert, the highest point at 14,440 feet. The eastern part of the state is characterized by the High Plains, which are used for agriculture and ranching. Additionally, the state has deserts and canyons in the western and southwestern regions, and it is home to the Four Corners, the only point in the U.S. where four states meet (Colorado, New Mexico, Arizona, and Utah).

Colorado has diverse economy with key sectors including aerospace, technology, and outdoor recreation. The aerospace industry receives significant federal funding, while the tech sector is growing rapidly with numerous startups and established companies. The state's natural beauty also makes it a hub for outdoor activities and tourism.

In terms of IT-related large organizations, Colorado is home to many prominent tech companies. Arrow Electronics - a global provider of technology products, services, and solutions - has it’s HQ and a significant presence in the state. IBM, with operations in Boulder, focuses on cloud computing, AI, and other advanced technologies. Google operates a large campus in Boulder, contributing to the state's tech scene. Oracle is known for its database software and technology, cloud-engineered systems, and enterprise software products. Amazon has multiple facilities in Colorado, making it a key employer.

Colorado is home to a variety of higher education institutions that offer a wide range of programs, including cybersecurity studies and research. The University of Colorado Boulder is known for its comprehensive graduate programs, offering degrees in Technology, Cybersecurity, and Policy. This program combines technology, policy, and business with hands-on experience, and includes research opportunities in areas like blockchain technologies, cyber-physical systems security, and network engineering. Colorado State University, located in Fort Collins, offers highly regarded cybersecurity programs and is involved in extensive research in cybersecurity and related fields. The University of Denver provides several cyber and information security programs, including fast-paced bootcamps, graduate certificates, and master’s degrees, designed to equip students with the skills necessary to start or advance their careers in cybersecurity.

The University of Colorado Colorado Springs (UCCS) stands out with its robust cybersecurity programs and research initiatives. UCCS offers a variety of cybersecurity-related degrees and is deeply involved in research that focuses on various aspects of cybersecurity. The university's cybersecurity programs are designed to provide students with the knowledge and skills needed to address current and emerging cyber threats. UCCS also collaborates with industry partners and government agencies to advance cybersecurity research and develop innovative solutions to complex security challenges.

Additionally, the Colorado School of Mines, known for its engineering programs, offers cybersecurity-related studies and research opportunities. The University of Colorado Denver offers a Bachelor of Science in Cybersecurity, preparing students for careers in online security with skills to defend against malicious attacks.

These institutions not only provide cybersecurity education but also engage in significant research to advance the field. If you have a specific university or program in mind, I can provide more detailed information.

These organizations and universities contribute significantly to Colorado's economy and help position the state as a tech hub.

Privacy from Legal firms and Attorney Generals perspective

It was interesting to experience multiple different perspectives on roughly the same topic. First, we met and talked with the lawyers and leaders of a law firm. Among other things, we discussed issues of data privacy and other cybersecurity aspects. The company was Dorsey & Whitney, and it was here that we first understood the magnitude of the challenge. Especially for international companies, but even for companies operating in multiple states in the U.S., the legal system is quite diverse. This means that, in practice, settings or general data privacy policies that are perfectly acceptable in one state might lead to immediate legal consequences in another state or country.

During our trip, we noticed a lot of advertisements from lawyers specializing in various compensation lawsuits. Data privacy is no exception among these topics. In this maze, it is almost impossible for some companies to find the right solution. This is why there is a great need for such firms that can develop a framework and help their clients prepare for international compliance and represent them in litigation if necessary.

Daniel Pietragallo is a Senior Assistant Attorney General with the Colorado Attorney General’s Office, focusing on complex financial fraud investigations and cybersecurity consulting. He teaches Cybersecurity, Data Privacy, and Incident Response Practicum at the University of Denver School of Law and serves on the Rocky Mountain Cyber Fraud Task Force steering committee.

It was even more interesting to observe that, so to speak, the other side faces similar problems. The Deputy Attorney General highlighted how much clearer his job would be in a European regulatory environment compared to the current difficulties in the United States. The varying regulations from state to state lead to organizations specializing in collecting and selling user data. In some states, even health data falls into this category, and as a state attorney, he is often powerless against it. On the other hand, they try to make use of the tools they have. Among other things, they have created regulations for artificial intelligence. The regulation was established in 2024, and compliance must be achieved within two years.

In case you’re interested which states regulate the privacy, I suggest this article.

Denver Votes!

One of the most interesting events of the three weeks was visiting one of the key locations for the elections, including the presidential election, in Denver. As election observers, we were able to watch the counting, registration, and processing of votes on-site. Needless to say, most American citizens don't get such an opportunity. The chairman and staff of the committee responsible for conducting the election answered all our questions regarding the information security aspects of the voting process and the integrity of the election.

Although the voting itself is secret, the fact of voting is not, meaning it is known whether each citizen voted. This is important because it ensures voters can be confident their vote counted, as they can verify it afterward. It also helps ensure that non-existent people's votes are not included in the statistics. Votes can be cast by mail or in person. However, the voting process is quite cumbersome, as voters have to answer dozens of questions. Filling out the ballot can take up to an hour.

We met many volunteers who were dedicated, disciplined, and visibly experienced in their tasks, which essentially take place day and night for weeks. Democrats, Republicans and others together in peace and unity. Despite the possibility of voting over several weeks, the majority of votes arrive on the last day. Therefore, significant qualifications have been implemented. Every vote can be verified by the voter, which is only possible because everything is scanned, but it must be done in a way that separates the records so that others cannot trace them back. The principles of voting are the same in every state, but the method of execution varies.

When we asked the organizers about the threats and incidents they face, and those that have occurred in the past, they reported quite different cases. For example, nationwide, there have been several instances of arson, where ballot boxes were set on fire. To prevent this, every box is equipped with fire extinguishers and alarms.

From a cybersecurity perspective, misinformation and disinformation are the most common issues. There was an instance where someone did not attend a scheduled meeting because they received a misleading phone call suggesting they should come at a different time. Measures have been introduced to counter such incidents, including deep fake attacks, and these are frequently applied. Additionally, there are numerous attempts to influence voters through emails or websites with various deceptive campaigns. These can include misleading information about the voting process or about the candidates.

Therefore, the cybersecurity and IT teams work closely with the city and state leadership, as communication regarding such misleading information is not the responsibility of the IT team.

You may be interested to understand how it worked in the elections of 2024. You’ll find detailed information here.

National Cybersecurity Center, Colorado Springs

Our team spent two days in Denver and then we moved on to Colorado Springs. For those who didn’t know, Denver lays around 1500 m above sea level, whilst Colorado Springs is even higher, about 2000 m. That’s why the central training location of the Olympic team of USA can be found here.

It was November as we arrived and we could experience the first snow in the town, and the peaks of beautiful mountains looked down at us from over 14000 feet, so 4500 m.

You could hardly paint a better background to the Modern building of National Cybersecurity Center and Space ISAC.

The National Cybersecurity Center (NCC) in Colorado Springs is a non-profit organization dedicated to cyber innovation and awareness. Established in 2016, the NCC was founded through the vision of Governor John Hickenlooper, in collaboration with the University of Colorado Colorado Springs (UCCS) and the local community.

The NCC serves both public and private sectors by providing training, education, and research in cybersecurity. It offers various programs, including cybersecurity summer camps for middle and high school students, operational impact assessments to protect citizens' data, and training for government leaders on cyber hygiene. The NCC also facilitates the Space Information Sharing and Analysis Center (Space ISAC).

The center is part of a larger ecosystem that includes Exponential Impact, a technology startup accelerator, and the UCCS Kevin W. O’Neil Cybersecurity Education and Research Center. This collaborative environment helps the NCC lead efforts in creating a safer, more resilient cyber landscape.

Those was not the first and also not the last time when I had the feeling, that it’s really worth being a startup or entrepreneur in the US.

They also facilitate local meetups, networking. The office space itself generates new thoughts and motivates you to stay thinking of solving a problem.

For example you’ll find here a program of theirs, banned Crown a jewel assessment.

The Space ISAC

This is the place which made one of the most persistent impression on us. The facility looks – of course – cool, the people working here are enthusiasts, professionals but open minded, and communicative.

The Space Information Sharing and Analysis Center (Space ISAC) is a collaborative organization dedicated to enhancing the security and resilience of the global space industry. It serves as the primary communication channel for sharing timely and actionable information about vulnerabilities, incidents, and threats to space assets.

Space ISAC brings together public and private sector entities to collectively protect and defend space missions and the critical services they provide. Members benefit from access to threat intelligence, analysis, and resources to support response, mitigation, and resilience initiatives. The center also focuses on workforce development, STEM education, and advocating for responsible behavior in space.

Additionally, Space ISAC has launched initiatives like the Space Automated Threat Intelligence Sharing (SATIS) Technical Committee, which aims to secure space operations against evolving cyber threats.

If your organization has activities in the space industry, then you should consider joining their community. They provide great quality, proven and actionable threat information and recommendations specifically for space technologies. You cannot imagine the scale of this area, starting from space junk to specific malware for satellite communications equipment.

You can find your suitable plan here.

The private sector of Colorado

This was not all, we had the chance to gather some personal experience, by visiting national parks in the area as well as climbing the famous Pike’s peak, at 4500m. We used a cog train, but I still felt the symptoms of mountain sickness…

But the other informative and interesting area of private world are the local companies. I present two of them below.

Firstly Cyber Qubits is a cybersecurity training and consulting company based in Greenwood Village, Colorado. They focus on developing the next generation of cybersecurity professionals through hands-on learning and expert instruction. Their programs cater to both beginners and experienced professionals, offering flexible scheduling and a variety of courses, from fundamental network security to advanced cybersecurity techniques.

Cyber Qubits is committed to empowering learners with the necessary tools and expertise to protect valuable data against evolving digital threats. They provide training for individuals and organizations, aiming to elevate skills and enhance security knowledge.

Saving a city during a Table top exercise

At this point the members of the visitor team started to know each other, so the competition to between groups off the team seemed a great fun to be and it was indeed!

Who helped us coordinating it was the CEO of CSD Cyber, Alfred Ortiz, who has over 15 years of experience in information technology, having worked with companies like Hewlett-Packard, Infor Global Solutions, and DriveLock before founding CSD Cyber.

CSD Cyber itself is a cybersecurity company based in Colorado Springs, Colorado. They specialize in providing comprehensive data protection services and tools to ensure business continuity and compliance for their clients. Their offerings include endpoint security software, vulnerability risk assessments, penetration testing, red team services, cyber forensics, and a deep OSINT cyber scoring platform.

The company is also actively involved in the local community, participating in organizations like the AFCEA, Colorado Springs Chamber of Commerce, and Cybermountain Roundtable.

In case you’re looking for a good, flexible partner in the area, I recommend getting in contact with Alfred.

crossmenu
SOCWISE
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.