The following list outlines some of the cybersecurity capabilities available and under consideration for the FY 24-25 Local Government Cybersecurity Grant Program. These offerings are designed to address a wide range of cybersecurity needs, from asset discovery and protection to enhancing response strategies against cyber threats. Review the list to identify which capabilities align with your current cybersecurity requirements and planning. Within the grant application, you will also have an opportunity to recommend additional capabilities not listed.

  1. External-Facing Asset Discovery:

    This capability identifies digital assets accessible from the internet, helping the state assess potential entry points for cyber threats and vulnerabilities.

  2. Endpoint-Based Asset Discovery:

    By detecting devices connected to the network, this capability aids in maintaining an up-to-date inventory of hardware, improving security management and incident response.

  3. Network-Based Asset Discovery:

    Similar to the previous capability, this focuses on identifying devices from a network perspective, helping administrators gain visibility into all network-connected assets.

  4. Endpoint Protection and Response:

    This capability safeguards individual devices from cyber threats by preventing, detecting, and responding to malicious activities in real-time.

  5. Content Delivery Network:

    By distributing web content across a network of servers, this capability enhances website performance and provides security against various online threats.

  6. Security Operations Platform:

    Centralizing security operations, this platform enables continuous monitoring, threat detection, and coordinated incident response across digital infrastructure.

  7. Email Security Gateway:

    Protecting against email-based threats, this capability filters incoming emails for malicious content, shielding communication channels from phishing and malware.

  8. Multi-Factor Authentication (MFA):

    Multi-factor authentication is an authentication method requiring the user to provide two or more verification factors to gain access. Using MFA provides an additional layer of access protection.

  9. Business Continuity (backup, disaster recovery, data encryption):

    Combine backup, disaster recovery, and data encryption to safeguard your critical information. This helps your organization quickly recover from disruptions and minimize downtime in the event of cyberattacks, disasters, or hardware failures.

  10. Identity and Access Management:

    Managing user identities and access privileges, this capability ensures that only authorized individuals can access sensitive resources.

  11. Private Access / Secure (Access) Service Edge Applications:

    This capability ensures that applications accessible from the network edge are secure against external attacks, maintaining the integrity of sensitive data.

  12. Security Investigation and Event Management:

    This capability provides tools for analyzing security events, assisting in understanding the scope and impact of potential security incidents.

  13. Governance, Risk, and Compliance Platform:

    This platform helps manage risks and maintain compliance with regulations, ensuring digital operations adhere to legal and security standards.

  14. Investigation, Visualization and Reporting:

    Solution that unifies investigation, data visualization, and reporting. Helps analysts understand events associated to complex cyberattacks and make faster decisions related to incident response.

  15. Vulnerability Assessment and Management:

    Identifying and prioritizing vulnerabilities, this capability assists in maintaining the security posture of digital assets.

  16. Cybersecurity Risk Assessment Services:

    Identify vulnerabilities and potential threats to your organization’s data and systems. Allows your organization to proactively prioritize risks, allocate resources, and help prevent costly cyberattacks.

  17. Cybersecurity Consulting Services:

    Offer a comprehensive assessment of vulnerabilities, security strategy development, and incident response guidance. May include hands-on assistance to strengthen your security controls. configuration and overall program.

State Term Contract and Agency Term Contract information can now be found at the Procurement Materials page.

Back To Top