Laserfiche WebLink
HSGP Appendix | 2023 Page A-46 <br />The DHS SLTT Cybersecurity Engagement Program within CISA was established to help non-federal <br />public stakeholders and associations manage cyber risk. The program provides appointed and elected <br />SLTT government officials with cybersecurity risk briefings, information on available resources, and <br />partnership opportunities to help protect their citizens online. Through these and related activities, the <br />program coordinates DHS’s cybersecurity efforts with its SLTT partners to enhance and protect their <br />cyber interests. More information on all of the CISA resources available to support SLTT governments is <br />available at Resources | CISA. <br />Framework for Improving Critical Infrastructure Cybersecurity <br />When requesting funds for cybersecurity, applicants are encouraged to propose projects that would aid in <br />implementation of all or part of the Framework for Improving Critical Infrastructure Cybersecurity (the <br />“Framework”) developed by the National Institute of Standards and Technology (NIST). The Framework <br />gathers existing international standards and practices to help organizations understand, communicate, and <br />manage their cyber risks. For organizations that do not know where to start with developing a <br />cybersecurity program, the Framework provides initial guidance. For organizations with more advanced <br />practices, the Framework offers a way to improve their programs, such as better communication with <br />their leadership and suppliers about management of cyber risks. <br />CISA’s Critical Infrastructure Cyber Community C³ Voluntary Program also provides resources to critical <br />infrastructure owners and operators to assist in adoption of the Framework and managing cyber risks. <br />Additional information on the Critical Infrastructure Cyber Community C³ Voluntary Program can be <br />found at Critical Infrastructure Cyber Community C³ Voluntary Program | CISA. <br />DHS’s Enhanced Cybersecurity Services (ECS) program is an example of a resource that assists in <br />protecting U.S.-based public and private entities and combines key elements of capabilities under the <br />“Detect” and “Protect” functions to deliver an impactful solution relative to the outcomes of the <br />Cybersecurity Framework. Specifically, ECS offers intrusion prevention and analysis services that help <br />U.S.-based companies and SLTT governments defend their computer systems against unauthorized <br />access, exploitation, and data exfiltration. ECS works by sourcing timely, actionable cyber threat <br />indicators from sensitive and classified Government Furnished Information (GFI). DHS then shares those <br />indicators with accredited Commercial Service Providers (CSPs). Those CSPs in turn use the indicators to <br />block certain types of malicious traffic from entering a company’s networks. Groups interested in <br />subscribing to ECS must contract directly with a CSP in order to receive services. Please visit Enhanced <br />Cybersecurity Services (ECS) | CISA for a current list of ECS CSP points of contact. <br />Regional Resiliency Assessment Program (RRAP) <br />The RRAP is a cooperative assessment of specific critical infrastructure within a designated geographic <br />area and a regional analysis of the surrounding infrastructure that address a range of infrastructure <br />resilience issues that could have regionally and nationally significant consequences. These voluntary, <br />non-regulatory RRAP projects are led by the Infrastructure Security Division and are selected each year <br />by DHS with input and guidance from federal, state, and local partners. For additional information on the <br />RRAP, visit Regional Resiliency Assessment Program | CISA. <br />Law Enforcement Support Office (LESO), or 1033 Program <br />The LESO facilitates a law enforcement support program, which originated from the National Defense <br />Authorization Act of Fiscal Year 1997. This law allows the transfer of excess Department of Defense <br />property that might otherwise be destroyed by law enforcement agencies across the United States and its <br />territories.