Codify — Article

California creates a statewide Cybersecurity Integration Center with AI playbook and contractor reporting

Establishes a central OES‑led hub, a Cyber Incident Response Team, reporting on federal cybersecurity grants, and a mandated AI cybersecurity playbook that requires state contractors to share AI vulnerabilities.

The Brief

The bill requires the Office of Emergency Services (OES) to establish and run the California Cybersecurity Integration Center (CCIC) as the state’s central coordinating hub for cybersecurity. The center must bring together state and federal agencies, law enforcement, utilities, and academic institutions; develop a statewide cybersecurity strategy; form a Cyber Incident Response Team; and coordinate information sharing on threats affecting public and private networks.

Two enforcement and accountability mechanisms are built into the statute: (1) four statutory reports that document state spending of federal State and Local Cybersecurity Improvement Act funds for specific fiscal years, and (2) an AI Cybersecurity Collaboration Playbook due by January 1, 2027, which—for state contractors and vendors providing AI services—must include mandatory mechanisms to share known AI-related threats and vulnerabilities with a designated state entity. The bill locks in confidentiality protections for threat indicators and sets out who may receive that information.

At a Glance

What It Does

The bill directs OES to create the California Cybersecurity Integration Center, coordinate cross‑sector threat sharing, produce a statewide cybersecurity strategy, and operate a Cyber Incident Response Team. It requires four reports on federal SLCAI expenditures and a California AI Cybersecurity Collaboration Playbook that mandates contractor reporting of AI vulnerabilities to a designated state entity.

Who It Affects

State agencies and departments, law enforcement partners (including federal agencies named in the statute), utilities, K–12 and higher education institutions, and private vendors that contract with the state to provide AI services. The playbook imposes specific information‑sharing obligations on state contractors and limits disclosure of shared cybersecurity information to approved state personnel and contractors.

Why It Matters

The statute centralizes California’s cybersecurity functions into a single hub and creates a formal mechanism to force AI‑related vulnerability disclosures from state contractors—shifting how the state manages supply‑chain and AI risks. It also couples transparency about federal cybersecurity grant spending with operational tools for threat coordination.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill makes the Office of Emergency Services the host agency for a new California Cybersecurity Integration Center (CCIC). The CCIC’s stated mission is to reduce the likelihood and severity of cyber incidents that could harm the state’s economy, critical infrastructure, or public and private networks.

Membership is narrowly defined: it must include specific state offices and departments, certain federal partners, and representatives of academic institutions and utilities, with room for additional members designated by the OES director.

Operationally, the CCIC is both an information hub and a coordinating body. It must receive and share cyber threat information from utilities, academic institutions, private companies, and other sources; issue warnings to public and nongovernmental partners; assess risks to critical infrastructure and IT networks; prioritize threats; and share recommended security practices.

The statute explicitly connects the CCIC with the California State Threat Assessment System and federal counterpart centers to enable cross‑jurisdictional coordination.To provide hands‑on response capacity, the CCIC must stand up a Cyber Incident Response Team composed of personnel drawn from member organizations. That team is tasked with leading threat detection, reporting, and response across the state and assisting law enforcement agencies with primary jurisdiction over cyber crimes.

The statute positions the team to support state agencies’ compliance with statutory cybersecurity assessments, audits, and accountability programs.The bill also creates two distinct accountability strands. First, it requires four itemized reports documenting state expenditures of federal State and Local Cybersecurity Improvement Act funds for fiscal years 2021–22 through 2024–25, delivered to the Legislature on statutorily specified dates and subject to a statutory reporting compliance provision.

Second, it directs the CCIC to produce a California AI Cybersecurity Collaboration Playbook by January 1, 2027. The playbook must be developed with the Office of Information Security and the Government Operations Agency, informed by federal guidance such as the Joint Cyber Defense Collaborative playbook, and must include mandatory mechanisms for state contractors and vendors to report AI‑related threats and vulnerabilities to a state entity designated in the playbook.

The playbook may create voluntary reporting paths for other entities.Finally, the statute sets confidentiality and disclosure rules for information handled under the playbook. It exempts records that are privileged, copyrighted, protected by other law, or otherwise exempt under the California Public Records Act, and declares that cyber threat indicators and defensive measures shared under the playbook are confidential and may only be circulated to state employees and contractors approved to receive them, subject to the playbook’s security requirements.

The Five Things You Need to Know

1

OES must establish and lead the California Cybersecurity Integration Center and include specified state and federal agencies, plus CSU, UC, community colleges, and the State Department of Education among its members.

2

The CCIC must create a Cyber Incident Response Team composed of personnel from member organizations to lead statewide cyber detection, reporting, and response and to assist law enforcement with cyber investigations.

3

The CCIC must deliver four reports documenting state expenditures of federal State and Local Cybersecurity Improvement Act funds for FY2021–22 through FY2024–25, with statutory delivery dates ending December 31, 2026, and subject to Section 9795 compliance.

4

By January 1, 2027, the CCIC must produce a California AI Cybersecurity Collaboration Playbook developed with the Office of Information Security and the Government Operations Agency and informed by federal standards and the JC3 playbook.

5

The AI playbook must include mandatory mechanisms requiring state contractors and vendors that provide AI services to report known threats and vulnerabilities related to those services to a state entity; information shared under the playbook is confidential and limited to approved state employees and contractors.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Subdivision (a)

Creation, mission, and required membership of the CCIC

This provision makes OES the host agency for the CCIC, defines its primary mission to reduce cyber incidents that threaten California’s economy or infrastructure, and lists required member organizations by name. Practically, the statute forces cross‑agency representation (from OES, OIS, CHP, Military Department, AG, HHSA, higher education, and specific federal partners) which creates a governance baseline: the CCIC cannot be staffed only with ad hoc volunteers but must include the named offices and agencies. The director may add members, so the membership list is a floor rather than a ceiling.

Subdivision (b)

Operational role: information sharing, warnings, and assessments

This section sets out the CCIC’s core operational duties: collect and share threat information (including from utilities and educational institutions), warn partners about attacks, assess risks to critical infrastructure and IT networks, prioritize threats, and distribute recommended security measures. It also requires close coordination with federal centers, which means information flows both upward and laterally; practitioners should expect standardized intake and dissemination processes and the need to integrate federal feeds into state situational awareness.

Subdivision (c)

Statewide cybersecurity strategy development

The CCIC must draft a statewide cybersecurity strategy drawing on recommendations from the state Task Force on Cybersecurity and federal and industry standards. The statute lists concrete objectives—improving threat identification and sharing, emergency preparedness, standardizing data protection implementation, strengthening digital forensics, and developing the cybersecurity workforce—creating both a policy roadmap and a set of performance goals that agencies will be expected to align with.

3 more sections
Subdivision (d)

Cyber Incident Response Team (CIR Team)

This clause requires the CCIC to form a standing CIR Team composed of personnel from member organizations to act as California’s primary unit for cyber detection and response. The provision explicitly authorizes the team to assist criminal investigators and state information security authorities, which means the CIR Team will operate at the intersection of operational response and law enforcement support; that dual role raises practical questions about evidence handling, chain of custody, and coordination protocols between civil response and criminal investigation units.

Subdivision (f)

Reporting on federal SLCAI expenditures

The statute mandates four detailed reports accounting for state expenditures of federal State and Local Cybersecurity Improvement Act funds for fiscal years 2021–22 through 2024–25, with delivery deadlines set between December 31, 2023 and December 31, 2026, and requires compliance with Section 9795. These are line‑item accountability documents intended to give the Legislature visibility into how federal cybersecurity grant funds were spent; agencies will need to reconcile financial records and program outcomes to meet the statutory reporting standard.

Subdivision (g)

California AI Cybersecurity Collaboration Playbook and confidentiality

This provision requires the CCIC to deliver an AI Cybersecurity Collaboration Playbook by January 1, 2027, developed with the Office of Information Security and Government Operations Agency and informed by federal playbooks. The playbook must include mandatory mechanisms for state contractors and vendors to share AI‑related threats and vulnerabilities tied to contracted services, allow voluntary mechanisms for others, and contain strict confidentiality rules: privileged or CPRA‑exempt records need not be disclosed publicly, and shared cyber threat indicators and defensive measures are confidential and may only be transmitted to approved state employees and contractors under the playbook’s security regime.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Technology across all five countries.

Explore Technology in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • State agencies and departments — gain a centralized hub for threat intelligence, standardized practices, and a dedicated CIR Team that can coordinate responses and assist with meeting statutory cybersecurity assessment and audit obligations.
  • Utilities and critical infrastructure operators — receive prioritized risk assessments, warnings, and sector‑specific guidance that can improve resilience and incident response across interdependent systems.
  • K–12 and higher education institutions — are explicitly included as sources and recipients of threat information, giving schools access to state coordination, threat warnings, and potential assistance from the CIR Team.
  • Law enforcement and cyber investigators — obtain an organized support unit (the CIR Team) to improve digital forensics and interagency coordination when cyber incidents have criminal components.
  • Cybersecurity workforce and training programs — the statewide strategy’s focus on workforce development and deeper expertise creates opportunities for training, recruitment, and public‑private collaboration.

Who Bears the Cost

  • State contractors and AI vendors — face new mandatory reporting obligations to disclose AI‑related threats and vulnerabilities tied to contracted services, which will require contractual changes, internal processes for triage and reporting, and potential exposure of sensitive code or models to the state.
  • Office of Emergency Services and member agencies — must staff, operate, and secure the CCIC and CIR Team, develop the AI playbook, and compile the SLCAI expenditure reports, creating administrative and budgetary burdens unless additional resources are provided.
  • Private companies sharing threat information — may shoulder operational costs and face legal complexity around trade secrets, intellectual property, and liability protections when transmitting vulnerability information to the CCIC.
  • Local educational agencies and school districts — while beneficiaries, they must manage integration into statewide information‑sharing flows and respond to guidance and possible audit/support requests, creating capacity demands.
  • The state budget and procurement offices — will need to handle increased oversight of contracts, likely requiring procurement teams to negotiate new reporting clauses and vendor assurances that could raise procurement costs or delay contracting timelines.

Key Issues

The Core Tension

The central tension is between centralized, mandatory information sharing to improve collective cybersecurity and the need to protect vendor proprietary information, civil liberties, and commercial incentives: forcing disclosures can strengthen defenses and situational awareness, but without robust legal, technical, and procedural protections it risks driving vendors away, complicating procurement, and exposing sensitive data.

The statute packs several implementation dilemmas into relatively short text. The mandatory contractor reporting requirement in the AI playbook is operationally powerful but legally blunt: vendors will need clear contractual language and legal protections to prevent proprietary data loss or unintended public disclosure.

The bill tries to limit public disclosure through CPRA exemptions and by making information shared under the playbook confidential, but it does not create an express federal‑level shield or specify liability protections for vendors who comply; that gap could chill vendor cooperation or prompt renegotiation of pricing and indemnities.

Practical implementation will also hinge on resources and authorities. OES must not only host the CCIC but also coordinate multiple agencies and federal partners and stand up a CIR Team, while producing four retrospective grant‑expenditure reports and a detailed AI playbook.

Without dedicated staffing, secure information systems, and clearly defined roles for evidence handling between response personnel and criminal investigators, the CCIC risks becoming a bureaucratic center with limited operational effect. Finally, the statute leaves technical specifics—what data formats to use, how quickly vendors must report, who qualifies as an "approved" recipient, and how to reconcile competing federal and state sharing protocols—to the playbook and implementing rules, creating a period of regulatory uncertainty for partners that must be resolved in subsequent operational guidance.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.