The vendor is required to provide for up to $50,000 in federal fy2022 state homeland security program (SHSP) funding made available by department for eligible applicants to enhance and sustain their cybersecurity posture as well as ensure that their information systems are secure and protected from cyber incidents.
• To provide state local jurisdictions with the resources and equipment necessary to prevent disruption of the confidentiality, integrity, and availability of their information systems.
• To assess cybersecurity risks, identify vulnerabilities and determine capability gaps with the focus of allocating resources to address the most critical needs.
• To ensure that local jurisdictions are equipped with the knowledge and resources necessary for providing cybersecurity awareness training to their staff in support of good cyber hygiene at the user level.
• To develop actionable cybersecurity plans that focus on response and immediate remediation to a cyber incident.
• To encourage the participation in established cybersecurity support networks and utilization of the vast number of resources available to local governments.
a. To provide state local jurisdictions with the resources and equipment necessary to prevent disruption of the confidentiality, integrity, and availability of their information systems
• The confidentiality, integrity and availability of information, or the CIA triad of cybersecurity, represent the fundamental aspects of data that are sought to be protected within an organization’s network.
• Confidentiality refers to maintaining legally protected or private data, accessible only to parties intended by the organization.
• Integrity refers to maintaining accuracy and completeness of data.
• Information technology systems, as they relate to cybersecurity, consist of physical equipment, such as endpoint devices, servers and other hardware components that provide protection, as well as programmatic resources, such as firewalls and anti-virus software.
• Systems must be kept up to date and operating properly to ensure critical information is protected and secure.
• The fy2022 cybersecurity targeted grant program supports local jurisdictions in protecting their systems through the use of funding and ensuring these systems continue to operate effectively to minimize cybersecurity risk, thus limiting harmful consequences to the organization.
b. To assess cybersecurity risks, identify vulnerabilities and determine capability gaps with the focus of allocating resources to address the most critical needs.
• Every jurisdiction carries at least some degree of risk. vulnerabilities within organizations can present in a variety of areas.
• Two perspectives from which to assess cybersecurity are that of governance/policy, to include awareness training, in addition to that of physical systems, including equipment and software.
• Conducting a comprehensive risk assessment will help jurisdictions determine specific areas within their organization may present a risk for exploitation by an adversary.
• The risk assessment process should be used to identify specific vulnerabilities and to assist with prioritizing the most critical needs
1. Center for internet security (cis) controls – introduction:
• The grant encourages entities to evaluate their cyber posture using the center for internet security (CIS) controls and apply for funding to remediate the gaps they identify.
• The cis controls are a list of high-priority, highly effective defensive actions that provide a “must-do, do-first” starting point for every entity seeking to improve their cyber defense.
2. CIS controls – focus on implementation group 1
• Provided an abbreviated version of its controls assessment tool, which is based on audit scripts critical security controls initial assessment tool”, as a part of the cybersecurity grant program.
• The tool focuses on implementation group 1 safeguards, which are the aspects of the cis controls that are essential for a successful cybersecurity program and are achievable with limited cybersecurity expertise.
• The entity may wish to consider a consulting engagement to implement the capability or use of an outsourced or managed service.
• Proper procurement guidelines must be followed in the event that consultants are engaged for these services
3. Multi-factor authentication (MFA) – many incidents and compromises occur as a result of phishing, credential theft, and single factor authentication solutions risks can be mitigated by implementing multi-factor authentication.
4. Email filtering - One of the most common vectors for malware and social engineering is phishing. while not an implementation group 1 safeguard, we recognize that, when coupled with effective end user awareness training and other organizational controls, email filtering can provide effective protection for an entity and its mail system.
5. Backup solutions – as seen in many headlines, ransomware continues to be a leading threat. ensuring proper backup solutions are in place and tested can help with recovery in the case of a ransomware or other infection. it is important to maintain offline, non-network addressable backups many entities have experienced infections that encrypted their entire network and backups.
c. To ensure that local jurisdictions are equipped with the knowledge and resources necessary for providing cybersecurity awareness training to their staff in support of good cyber hygiene at the user level.
• In addition to physical systems, an equally, if not more critical component to cybersecurity is ensuring that all users of information technology systems are following safe and secure practices.
• Accomplished through regularly administered trainings of cybersecurity best practices and establishing jurisdiction-wide policies to enforce these practices
• A common method of cyberattack known as “phishing” occurs when a malicious party sends a fraudulent email, often purporting to be from a trusted source. the email will contain a link or attachment which installs malicious software (malware).
• Lacking proper knowledge and awareness, a user could be deceived and open the link, thus creating an entry point for a cyberattack in this all-too-common scenario, a single user’s error will place the entire organization’s network at risk.
• Cyberattacks targeting users’ behavior, the importance of cybersecurity awareness training is paramount.
• Applicants of the fy2022 cybersecurity grant program are strongly encouraged to develop new or enhance existing cybersecurity training programs within their agency, as well as other investments focused on the creation of robust cybersecurity policies and practices.
d. To develop actionable cybersecurity plans that focus on response and immediate remediation to a cyber incident.
• In addition to utilizing grant funds to enhance protection and prevention of cyber threats, the fy2022 cybersecurity grant program further supports a focus towards response to a cyberattack, should one occur.
• Department recognizes that even jurisdictions with a robust cybersecurity posture still carry some degree of risk of a cyber incident.
• Having an effective response plan in place following such an event is critical in minimizing disruption of an organization’s systems. funding through this program supports local jurisdictions’ preparedness efforts to include effective planning and executing regular cybersecurity exercises
• Planning and exercises occurring at regular intervals, an organization can effectively measure their cybersecurity policies and defenses.
• Provide an opportunity for the organization to address any vulnerabilities identified during the exercise.
• Consequently, the organization will be prepared for real world cyber threats and any potential disruption would be minimized.
e. To encourage the participation in established cybersecurity support networks and utilization of the vast number of resources available to local governments.
• Through the fy2022 cybersecurity grant program, applicants are encouraged to take advantage of the many resources, available from organizations at the state and federal level, as well as the private sector, including information sharing and support networks, assessment tools, best practice recommendations and incident response assistance.
• Resources are available free of charge and provide government organizations with the ability to assess their current capabilities, identify where vulnerabilities exist, prioritize where to focus resources, and understand how to mitigate and plan for potential cyber incidents in the future.
- Questions/Inquires Deadline: March 6, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.