The vendor is required to provide s cyber security program safeguards the county's people, services, and infrastructure from cyber-attacks, data breaches, outages, mistakes, compliance failure, and other emerging threats.
- Provide the following cyber security services on an as-needed basis, as requested by county pursuant to a task order:
• Penetration testing
o Targets, timeframe scope, and information about the environment will be defined before the testing via a rules of engagement agreement.
o Techniques may include performing research, circumventing security controls, denial of service, remote access, building entry, data collection, exfiltration, or modification, as defined in the rules of engagement.
o All activities will be documented, including how to reverse any changes made to the environment.
o All county data will remain protected through access control and encryption throughout the engagement.
o All documented actions and results to be presented in a final report deliverable.
• Security and compliance assessment
o Targets and timeframe scope will be defined before the testing via a rules of engagement agreement.
o Techniques may include internal and external vulnerability scanning, review of config files and logs, review of processes architecture, and documentation, and techniques to non-destructively confirm the effectives of security controls.
o Assists in the creation of industry specific compliance documentation such as self-assessment questionnaire.
o All documented actions and results to be presented in a final report deliverable.
• Program advisement and strategy
o Assistance with development of policy language, incident response, business continuity, security staffing plans, and security strategy plans.
o Assistance with security strategic planning, including sharing information about emerging risks and how successful governments are organizing their activities to protect themselves.
o Assistance developing, selecting, and delivering timely educational material about cyber security and compliance.
o Assistance developing, delivering, and following up on tabletop exercises to develop incident response capabilities.
o Process improvement and business intelligence assistance to improve security, privacy, and compliance processes such as data loss prevention, risk management, crisis communication, recovery prioritization, and capability and maturity modelling.
• Threat intelligence
o Provides insight into emerging security risks.
o Provides insight into an attacker’s view of the county from the outside.
o Collaborates to understand changing regulations and how they apply to the county environment.
o Assists in responsibly sharing threat information with peer agencies.
• Infrastructure hardening
o Supports infrastructure teams with architecture improvements
a. Server hardening and secure configurations
b. Network hardening and secure configurations
c. Device hardening and secure configurations
d. Advises the infrastructure team to help the county address emerging trends in infrastructure design, standardization, and best practice
• Incident response support
o Attending incident response team meetings.
o Providing short-term engineering resources to fill a specific knowledge gap during an incident response.
o Assistance in determining the root case and containment status of an incident.
- Questions/Inquires Deadline: March 31, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.