What's Happening?
Rex Menold has been appointed as Michigan's Chief Security Officer (CSO) as of January 2026, a role that uniquely combines responsibilities for both cybersecurity and physical infrastructure. Menold's career with the state spans nearly three decades,
during which he has held various positions, including chief technology officer. Unlike most of his counterparts across the country who hold the title of Chief Information Security Officer (CISO), Menold's role reflects Michigan's distinctive approach to security. This approach integrates the protection of digital assets with the safeguarding of physical infrastructure, a strategy that is not commonly seen in other states. Menold's appointment and the state's strategy were discussed at the recent National Association of State Chief Information Officers conference.
Why It's Important?
The integration of cybersecurity with physical infrastructure security under a single role in Michigan highlights a growing recognition of the interconnected nature of digital and physical security threats. This approach could serve as a model for other states, emphasizing the need for comprehensive security strategies that address both cyber and physical vulnerabilities. By broadening the scope of the CSO role, Michigan aims to enhance its resilience against a wide range of threats, potentially setting a precedent for how states manage security in an increasingly digital world. This could lead to more robust security frameworks that better protect public assets and services, ultimately benefiting citizens by ensuring safer and more reliable infrastructure.
What's Next?
As Michigan continues to implement this integrated security approach, other states may observe and evaluate its effectiveness. If successful, it could prompt a reevaluation of security roles and strategies nationwide, encouraging a more holistic view of security management. Stakeholders, including government officials and security professionals, will likely monitor Michigan's progress to assess the potential benefits and challenges of such an integrated approach. Future developments may include adjustments to security policies and practices, as well as increased collaboration between cybersecurity and physical security teams.











