Add a note about this bill. Your note is for you and will not be shared with anyone.
Because you are a member of panel , your positions on legislation and notes below will be shared with the panel administrators. (More Info)
The text of the bill below is as of Aug 14, 2020 (Introduced). The bill was not enacted into law.
IN THE HOUSE OF REPRESENTATIVES
Mr. Langevin (for himself, Mr. Gallagher , Mr. Ruppersberger , Mr. Hurd of Texas , Mr. Richmond , Mr. McCaul , Mr. Rose of New York , and Mr. Bacon ) introduced the following bill; which was referred to the Committee on Homeland Security , and in addition to the Committees on Oversight and Reform , and Energy and Commerce , for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned
To establish in the Department of Homeland Security a program to make grants for emergency information technology expenses, and for other purposes.
This Act may be cited as the State and Local IT Modernization and Cybersecurity Act .
The term means the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security.
Appropriate congressional committees
the Committee on Homeland Security and Governmental Affairs of the Senate; and
the Committee on Homeland Security of the House of Representatives.
Covered information technology
In this section, the term includes the following information technology:
Enterprise productivity tools, including—
computer software for the purposes of managing payroll and budget;
personnel management solutions; and
customer relationship management software relating to the provision of services to users of such services.
Cybersecurity services and tools.
Computer networking equipment.
Covered information technology services
The term means any service necessary to install, implement, maintain, or upgrade covered information technology.
The term means the Department of Homeland Security.
The term means the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security.
Emergency information technology expenses
The term means expenses related to—
improving covered information technology;
conducting covered information technology services;
subsidizing payroll for information technology staff to maintain the current staffing level; or
government employees having the necessary covered information technology to telework.
The term has the meaning given the term under the State or local law of the relevant grant recipient.
The term has the meaning given the term in section 11101 of title 40, United States Code.
Public health emergency
The term means the public health emergency declared by the Secretary of Health and Human Services pursuant to section 319 of the Public Health Service Act ( 42 U.S.C. 247d ) on January 31, 2020, with respect to COVID–19.
The term means the Secretary of Homeland Security.
The term has the meaning given the term in section 311 of title 5, United States Code.
The term has the meaning given the term in section 421(13) of the Congressional Budget and Impoundment Control Act of 1974 ( 2 U.S.C. 658(13) ).
Public health emergency information technology grant program
There is established in the Department a program to be known as the Public Health Emergency Information Technology Grant Program (in this section referred to as the Public Health Emergency IT Grant Program ), under which the Secretary may award grants to States for emergency information technology expenses during the public health emergency.
Each State may apply for a grant under the Public Health Emergency IT Grant Program, and shall submit such information in support of such a grant as the Secretary may require.
Allocation of funds
Grants to Tribal governments under the Public Health Emergency IT Grant Program may not exceed $25,000,000 in the aggregate.
Administration and Oversight
The Secretary may not expend more than $10,000,000 for administration of the Public Health Emergency IT Grant Program.
Conditions on receipt of grant
Management of funds
To be eligible for a grant under the Public Health Emergency IT Grant Program, a State shall agree to designate the Chief Information Officer, or an equivalent official, of the State as the primary official for the management and allocation of funds awarded under the Public Health Emergency IT Grant Program.
Security standards and certifications
Not later than 90 days after the date of the enactment of this Act, the Secretary, in consultation with the Secretary of Commerce, shall select commonly accepted security standards and certifications with respect to covered information technology.
Security standards and certifications required
To be eligible for a grant under the Public Health Emergency IT Grant Program, a State shall agree to procure only covered information technology that meets or exceeds the standards and certifications selected pursuant to paragraph (1) with funds made available under such Program.
A State may not receive more than one grant under the Public Health Emergency IT Grant Program.
The Secretary may award grants to States under the Public Health Emergency IT Grant Program on the basis of the population of such State, except no grant awarded under such Program may be less than $5,000,000.
Each State that receives a grant under the Public Health Emergency IT Grant Program shall reserve not less than 40 percent of amounts received for the purpose of making subgrants to local governments within such State—
for emergency information technology expenses; or
to purchase licenses for covered information technology on behalf of such local governments.
Return of funds
Amounts received by States under the Public Health Emergency IT Grant Program that are not expended by the date that is two years after the date of the receipt of such funds shall be returned to the Treasury of the United States.
Reports by grant recipients
Not later than 180 days after receiving a grant under the Public Health Emergency IT Grant Program, a recipient of such grant shall submit to the Secretary a report that—
describes how grant funds were obligated or expended, including the use of funds made available as subgrants; and
demonstrates compliance by such recipient and subgrantee with the requirements of such Program.
Annual report to Congress
Not later than 1 year after the date of the enactment of this Act and annually thereafter until all funds under the Public Health Emergency IT Grant Program are expended or returned to the Treasury of the United States, the Secretary shall submit to the appropriate congressional committees a report that—
describes how grant funds were obligated or expended, including the use of funds made available as subgrants; and
demonstrates compliance by each recipient and subgrantee with the requirements of such Program.
Authorization of appropriations
There is authorized to be appropriated $1,000,000,000 for grants under the Public Health Emergency IT Grant Program. Amounts authorized to be appropriated pursuant to this subsection are authorized to remain available until September 30, 2022.
Modernizing IT grant program
There is established in the Department a program to be known as the Modernizing IT Grant Program , under which the Secretary may make grants to States to modernize information technology for the purpose of securely enabling digital delivery of government services, including the digital delivery of—
government benefit and entitlement programs; and
administrative services performed by a State.
To be eligible for a grant under the Modernizing IT Grant Program, a State shall—
with respect to fiscal years 2021, 2022, and 2023, maintain the funding levels of the lesser of fiscal year 2019, or the average of fiscal years 2017, 2018, and 2019, with respect to information technology support and modernization; and
provide matching funds equal to 5 percent of the amount of any grant received under the Modernizing IT Grant Program.
Each State may apply for a grant under the Modernizing IT Grant Program, and shall submit such information in support of such a grant as the Secretary may require, including the following:
A State information technology modernization plan, including—
a description of existing information technology;
the costs related to maintenance of existing information technology;
a compilation of recent security audits of existing information technology;
a compilation of recent operational performance reports of existing information technology;
a methodology to prioritize projects and procurement to account for—
operational gains; and
a transition plan to modernize existing information technology, including—
a comparative analysis of cloud-based versus on-premise solutions; and
an estimate of operation and maintenance costs for the information technology to be procured under such transition plan.
A local government information technology modernization plan describing how grants awarded under the Modernizing IT Grant Program will be used to provide—
subgrants to local governments to modernize their information technology supporting digital delivery of government services; or
shared services to local governments to support the digital delivery of government services.
The Secretary, acting through the Director, and in consultation with the Administrator of General Services, shall evaluate each application for a grant under the Modernizing IT Grant Program with respect to the appropriateness of the information technology modernization plan to improve cybersecurity and enhance the capability to effectively deliver digital government services.
The Director may provide technical assistance to States applying for a grant under the Modernizing IT Grant Program with respect to State and local government information technology modernization plans described in paragraph (1)(B).
Conditions on receipt of grant
Management of funds
To be eligible for a grant under the Modernizing IT Grant Program, a State shall agree to designate the Chief Information Officer, or an equivalent official, of the State as the primary official for the management and allocation of funds awarded under the Modernizing IT Grant Program.
Security standards and certifications
Not later than 1 year after the date of the enactment of this Act, the Secretary, in consultation with the Secretary of Commerce, shall select commonly accepted security standards and certifications with respect to information technology.
Security standards and certifications required
To be eligible for a grant under the Modernizing IT Grant Program, a State shall agree to procure only information technology that meets or exceeds the standards and certifications described in paragraph (1) with funds made available under such Program.
A State may not receive more than one grant under the Modernizing IT Grant Program.
The Secretary may determine the amount of a grant to be awarded to a State, excluding Tribal governments, under the Modernizing IT Grant Program based on the population of such State, except no grant awarded under such Program may be less than $100,000,000.
Grants to Tribal governments under the Modernization Grant Program may not exceed $500,000,000 in the aggregate.
Disbursement of funds
Grant funds awarded under the Modernizing IT Grant Program shall be dispersed in structured payments over a period of five years, in such increments as the Secretary determines appropriate for the project or procurement to be carried out using the funds.
Each State that receives a grant under the Modernizing IT Grant Program shall reserve not less than 40 percent of amounts received under such grant for the purpose of making a subgrant to local governments to implement the local government information technology modernization plan required under subsection (c)(1)(B).
Return of funds
Amounts received under the Modernizing IT Grant Program that are not expended by the date that is five years after the date of the receipt of such funds shall be returned to the Treasury of the United States.
The Secretary may not expend more than $25,000,000 for administration of the Modernizing IT Grant Program.
Reports by grant recipients
Not later than 180 days after receiving a grant under the Modernizing IT Grant Program, a recipient of such grant shall submit to the Secretary a report that—
describes how grant funds were obligated or expended, including the use of funds made available as subgrants; and
demonstrates compliance by each recipient and subgrantee with the requirements of such Program.
Annual report to Congress
Not later than 1 year after the date of the first grant awarded under the Modernizing IT Grant Program and annually thereafter until all funds are expended or returned to the Treasury of the United States, the Secretary shall submit to the appropriate congressional committees a report that—
describes how grant funds were obligated or expended, including the use of funds made available as subgrants; and
demonstrates compliance by each recipient and subgrantee with the requirements of such Program.
Authorization of appropriations
There is authorized to be appropriated $25,000,000,000 for grants under the Modernizing IT Grant Program. Amounts authorized to be appropriated pursuant to this subsection are authorized to remain available until September 30, 2027.
State and Local Cybersecurity Grant Program
Subtitle A of title XXII of the Homeland Security Act of 2002 ( 6 U.S.C. 651 et seq.) is amended by adding at the end the following new sections:
State and Local Cybersecurity Grant Program
The Secretary, acting through the Director, shall establish a program to make grants to States to address cybersecurity risks and cybersecurity threats to information systems of State, local, Tribal, or territorial governments (referred to as the State and Local Cybersecurity Grant Program in this section).
A grant awarded under this section shall be used in compliance with the following:
The Cybersecurity Plan required under subsection (d) and approved pursuant to subsection (g).
The Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments required in accordance with section 2210, when issued.
The State and Local Cybersecurity Grant Program shall be administered in the same program office that administers grants made under sections 2003 and 2004.
A State applying for a grant under the State and Local Cybersecurity Grant Program shall submit to the Secretary a Cybersecurity Plan for approval. Such plan shall—
incorporate, to the extent practicable, any existing plans of such State to protect against cybersecurity risks and cybersecurity threats to information systems of State, local, Tribal, or territorial governments;
describe, to the extent practicable, how such State shall—
enhance the preparation, response, and resiliency of information systems owned or operated by such State or, if appropriate, by local, Tribal, or territorial governments, against cybersecurity risks and cybersecurity threats;
implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats in information systems of such State, local, Tribal, or territorial governments;
ensure that State, local, Tribal, and territorial governments that own or operate information systems within the State adopt best practices and methodologies to enhance cybersecurity, such as the practices set forth in the cybersecurity framework developed by the National Institute of Standards and Technology;
promote the delivery of safe, recognizable, and trustworthy online services by State, local, Tribal, and territorial governments, including through the use of the .gov internet domain;
mitigate any identified gaps in the State, local, Tribal, or territorial government cybersecurity workforces, enhance recruitment and retention efforts for such workforces, and bolster the knowledge, skills, and abilities of State, local, Tribal, and territorial government personnel to address cybersecurity risks and cybersecurity threats;
ensure continuity of communications and data networks within such State between such State and local, Tribal, and territorial governments that own or operate information systems within such State in the event of an incident involving such communications or data networks within such State;
assess and mitigate, to the greatest degree possible, cybersecurity risks and cybersecurity threats related to critical infrastructure and key resources, the degradation of which may impact the performance of information systems within such State;
enhance capability to share cyber threat indicators and related information between such State and local, Tribal, and territorial governments that own or operate information systems within such State; and
develop and coordinate strategies to address cybersecurity risks and cybersecurity threats in consultation with—
local, Tribal, and territorial governments within the State; and
neighboring States or, as appropriate, members of an information sharing and analysis organization; and
neighboring countries; and
include, to the extent practicable, an inventory of the information technology deployed on the information systems owned or operated by such State or by local, Tribal, or territorial governments within such State, including legacy information technology that is no longer supported by the manufacturer.
The Cybersecurity Plan of a State described in paragraph (1) may include—
cooperative programs developed by groups of local, Tribal, and territorial governments within such State to address cybersecurity risks and cybersecurity threats; and
programs provided by such State to support local, Tribal, and territorial governments and critical infrastructure owners and operators to address cybersecurity risks and cybersecurity threats.
A State applying for a grant under this section shall establish a cybersecurity planning committee to assist in the following:
The development, implementation, and revision of such State’s Cybersecurity Plan required under subsection (d).
The determination of effective funding priorities for such grant in accordance with subsection (f).
Cybersecurity planning committees described in paragraph (1) shall be comprised of representatives from counties, cities, towns, and Tribes within the State receiving a grant under this section, including, as appropriate, representatives of rural, suburban, and high-population jurisdictions.
Rule of construction regarding existing planning committees
Nothing in this subsection may be construed to require that any State establish a cybersecurity planning committee if such State has established and uses a multijurisdictional planning committee or commission that meets the requirements of this paragraph.
A State that receives a grant under this section shall use the grant to implement such State’s Cybersecurity Plan, or to assist with activities determined by the Secretary, in consultation with the Director, to be integral to address cybersecurity risks and cybersecurity threats to information systems of State, local, Tribal, or territorial governments, as the case may be.
Approval of plans
Approval as condition of grant
Before a State may receive a grant under this section, the Secretary, acting through the Director, shall review and approve such State’s Cybersecurity Plan required under subsection (d).
In approving a Cybersecurity Plan under this subsection, the Director shall ensure such Plan—
meets the requirements specified in subsection (d); and
upon issuance of the Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments authorized pursuant to section 2210, complies, as appropriate, with the goals and objectives of such Strategy.
Approval of revisions
The Secretary, acting through the Director, may approve revisions to a Cybersecurity Plan as the Director determines appropriate.
Notwithstanding the requirement under subsection (d) to submit a Cybersecurity Plan as a condition of apply for a grant under this section, such a grant may be awarded to a State that has not so submitted a Cybersecurity Plan to the Secretary if—
such State certifies to the Secretary that it will submit to the Secretary a Cybersecurity Plan for approval by September 30, 2022;
such State certifies to the Secretary that the activities that will be supported by such grant are integral to the development of such Cybersecurity Plan; or
such State certifies to the Secretary, and the Director confirms, that the activities that will be supported by the grant will address imminent cybersecurity risks or cybersecurity threats to the information systems of such State or of a local, Tribal, or territorial government in such State.
Limitations on uses of funds
A State that receives a grant under this section may not use such grant—
to supplant State, local, Tribal, or territorial funds;
for any recipient cost-sharing contribution;
to pay a demand for ransom in an attempt to regain access to information or an information system of such State or of a local, Tribal, or territorial government in such State;
for recreational or social purposes; or
for any purpose that does not directly address cybersecurity risks or cybersecurity threats on an information systems of such State or of a local, Tribal, or territorial government in such State.
In addition to other remedies available, the Secretary may take such actions as are necessary to ensure that a recipient of a grant under this section is using such grant for the purposes for which such grant was awarded.
Opportunity To amend applications
In considering applications for grants under this section, the Secretary shall provide applicants with a reasonable opportunity to correct defects, if any, in such applications before making final awards.
For fiscal year 2020 and each fiscal year thereafter, the Secretary shall apportion amounts appropriated to carry out this section among States as follows:
The Secretary shall first apportion 0.25 percent of such amounts to each of American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, and the Virgin Islands, and 0.75 percent of such amounts to each of the remaining States.
The Secretary shall apportion the remainder of such amounts in the ratio that—
the population of each State; bears to
the population of all States.
The Federal share of the cost of an activity carried out using funds made available under the program may not exceed the following percentages:
For fiscal year 2021, 90 percent.
For fiscal year 2022, 80 percent.
For fiscal year 2023, 70 percent.
For fiscal year 2024, 60 percent.
For fiscal year 2025 and each subsequent fiscal year, 50 percent.
Each State that receives a grant under this section shall certify to the Secretary that the grant will be used for the purpose for which the grant is awarded and in compliance with the Cybersecurity Plan or other purpose approved by the Secretary under subsection (g).
Availability of funds to local, Tribal, and territorial governments
Not later than 45 days after a State receives a grant under this section, such State shall, without imposing unreasonable or unduly burdensome requirements as a condition of receipt, obligate or otherwise make available to local, Tribal, and territorial governments in such State, consistent with the applicable Cybersecurity Plan—
not less than 80 percent of funds available under such grant;
with the consent of such local, Tribal, and territorial governments, items, services, capabilities, or activities having a value of not less than 80 percent of the amount of the grant; or
with the consent of the local, Tribal, and territorial governments, grant funds combined with other items, services, capabilities, or activities having the total value of not less than 80 percent of the amount of the grant.
Certifications regarding distribution of grant funds to local, Tribal, territorial governments
A State shall certify to the Secretary that the State has made the distribution to local, Tribal, and territorial governments required under paragraph (2).
Extension of period
A State may request in writing that the Secretary extend the period of time specified in paragraph (2) for an additional period of time. The Secretary may approve such a request if the Secretary determines such extension is necessary to ensure the obligation and expenditure of grant funds align with the purpose of the grant program.
Paragraph (2) shall not apply to the District of Columbia, the Commonwealth of Puerto Rico, American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, or the Virgin Islands.
If a State does not make the distribution to local, Tribal, or territorial governments in such State required under paragraph (2), such a local, Tribal, or territorial government may petition the Secretary.
In addition to other remedies available to the Secretary, the Secretary may terminate or reduce the amount of a grant awarded under this section to a State or transfer grant funds previously awarded to such State directly to the appropriate local, Tribal, or territorial government if such State violates a requirement of this subsection.
The Director shall establish a State and Local Cybersecurity Resiliency Committee to provide State, local, Tribal, and territorial stakeholder expertise, situational awareness, and recommendations to the Director, as appropriate, regarding how to—
address cybersecurity risks and cybersecurity threats to information systems of State, local, Tribal, or territorial governments; and
improve the ability of such governments to prevent, protect against, respond, mitigate, and recover from cybersecurity risks and cybersecurity threats.
The State and Local Cybersecurity Resiliency Committee shall—
submit to the Director recommendations that may inform guidance for applicants for grants under this section;
upon the request of the Director, provide to the Director technical assistance to inform the review of Cybersecurity Plans submitted by applicants for grants under this section, and, as appropriate, submit to the Director recommendations to improve such Plans prior to the Director’s determination regarding whether to approve such Plans;
advise and provide to the Director input regarding the Homeland Security Strategy to Improve Cybersecurity for State, Local, Tribal, and Territorial Governments required under section 2210; and
upon the request of the Director, provide to the Director recommendations, as appropriate, regarding how to—
address cybersecurity risks and cybersecurity threats on information systems of State, local, Tribal, or territorial governments; and
improve the cybersecurity resilience of such governments.
Number and appointment
The State and Local Cybersecurity Resiliency Committee shall be composed of 15 members appointed by the Director, as follows:
Two individuals recommended to the Director by the National Governors Association.
Two individuals recommended to the Director by the National Association of State Chief Information Officers.
One individual recommended to the Director by the National Guard Bureau.
Two individuals recommended to the Director by the National Association of Counties.
Two individuals recommended to the Director by the National League of Cities.
One individual recommended to the Director by the United States Conference of Mayors.
One individual recommended to the Director by the Multi-State Information Sharing and Analysis Center.
Four individuals who have educational and professional experience related to cybersecurity analysis or policy.
Each member of the State and Local Cybersecurity Resiliency Committee shall be appointed for a term of two years, except that such term shall be three years only in the case of members who are appointed initially to the Committee upon the establishment of the Committee. Any member appointed to fill a vacancy occurring before the expiration of the term for which the member’s predecessor was appointed shall be appointed only for the remainder of such term. A member may serve after the expiration of such member’s term until a successor has taken office. A vacancy in the Commission shall be filled in the manner in which the original appointment was made.
Members of the State and Local Cybersecurity Resiliency Committee shall serve without pay.
Chairperson; vice chairperson
The members of the State and Local Cybersecurity Resiliency Committee shall select a chairperson and vice chairperson from among Committee members.
Federal advisory committee act
The Federal Advisory Committee Act (5 U.S.C. App.) shall not apply to the State and Local Cybersecurity Resilience Committee.
Annual reports by State grant recipients
A State that receives a grant under this section shall annually submit to the Secretary a report on the progress of the State in implementing the Cybersecurity Plan approved pursuant to subsection (g). If the State does not have a Cybersecurity Plan approved pursuant to subsection (g), the State shall submit to the Secretary a report describing how grant funds were obligated and expended to develop a Cybersecurity Plan or improve the cybersecurity of information systems owned or operated by State, local, Tribal, or territorial governments in such State. The Secretary, acting through the Director, shall make each such report publicly available, including by making each such report available on the internet website of the Agency, subject to any redactions the Director determines necessary to protect classified or other sensitive information.
Annual reports to Congress
At least once each year, the Secretary, acting through the Director, shall submit to Congress a report on the use of grants awarded under this section and any progress made toward the following:
Achieving the objectives set forth in the Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments, upon the strategy’s issuance under section 2210.
Developing, implementing, or revising Cybersecurity Plans.
Reducing cybersecurity risks and cybersecurity threats to information systems owned or operated by State, local, Tribal, and territorial governments as a result of the award of such grants.
Authorization of appropriations
There are authorized to be appropriated for grants under this section—
for each of fiscal years 2021 through 2025, $400,000,000; and
for each subsequent fiscal year, such sums as may be necessary.
In this section:
The term has the meaning given that term in section 2.
Cyber threat indicator
The term has the meaning given such term in section 102 of the Cybersecurity Act of 2015.
The term means the Director of the Cybersecurity and Infrastructure Security Agency.
The term has the meaning given such term in section 2209.
Information sharing and analysis organization
The term has the meaning given such term in section 2222.
The term has the meaning given such term in section 102(9) of the Cybersecurity Act of 2015 ( 6 U.S.C. 1501(9) ).
The term has the meaning given that term in section 2.
The term means any internet-facing service, including a website, email, virtual private network, or custom application.
means each of the several States, the District of Columbia, and the territories and possessions of the United States; and
includes any federally recognized Indian tribe that notifies the Secretary, not later than 120 days after the date of the enactment of this section or not later than 120 days before the start of any fiscal year in which a grant under this section is awarded, that the tribe intends to develop a Cybersecurity Plan and agrees to forfeit any distribution under subsection (l)(2).
Cybersecurity resource guide development for State, local, Tribal, and territorial government officials
The Secretary, acting through the Director, shall develop a resource guide for use by State, local, Tribal, and territorial government officials, including law enforcement officers, to help such officials identify, prepare for, detect, protect against, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents (as such term is defined in section 2209).
The table of contents in section 1(b) of the Homeland Security Act of 2002 is amended by inserting after the item relating to section 2214 the following new items:
Sec. 2215. State and Local Cybersecurity Grant Program.
Sec. 2216. Cybersecurity resource guide development for State, local, Tribal, and territorial government officials.
Homeland Security Strategy To Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments
Section 2210 of the Homeland Security Act of 2002 ( 6 U.S.C. 660 ) is amended by adding at the end the following new subsection:
Homeland Security Strategy To Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments
Not later than 270 days after the date of the enactment of this subsection, the Secretary, acting through the Director, shall, in coordination with appropriate Federal departments and agencies, State, local, Tribal, and territorial governments, the State and Local Cybersecurity Resilience Committee (established under section 2215), and other stakeholders, as appropriate, develop and make publicly available a Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments that provides recommendations regarding how the Federal Government should support and promote the ability State, local, Tribal, and territorial governments to identify, protect against, detect respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents (as such term is defined in section 2209) and establishes baseline requirements and principles to which Cybersecurity Plans under such section shall be aligned.
The Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments required under paragraph (1) shall—
identify capability gaps in the ability of State, local, Tribal, and territorial governments to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents;
identify Federal resources and capabilities that are available or could be made available to State, local, Tribal, and territorial governments to help such governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents;
identify and assess the limitations of Federal resources and capabilities available to State, local, Tribal, and territorial governments to help such governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents, and make recommendations to address such limitations;
identify opportunities to improve the Agency’s coordination with Federal and non-Federal entities, such as the Multi-State Information Sharing and Analysis Center, to improve incident exercises, information sharing and incident notification procedures, the ability for State, local, Tribal, and territorial governments to voluntarily adapt and implement guidance in Federal binding operational directives, and opportunities to leverage Federal schedules for cybersecurity investments under section 502 of title 40, United States Code;
recommend new initiatives the Federal Government should undertake to improve the ability of State, local, Tribal, and territorial governments to help such governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents;
set short-term and long-term goals that will improve the ability of State, local, Tribal, and territorial governments to help such governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents; and
set dates, including interim benchmarks, as appropriate for State, local, Tribal, territorial governments to establish baseline capabilities to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents.
In developing the Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments required under paragraph (1), the Director, in coordination with appropriate Federal departments and agencies, State, local, Tribal, and territorial governments, the State and Local Cybersecurity Resilience Committee, and other stakeholders, as appropriate, shall consider—
lessons learned from incidents that have affected State, local, Tribal, and territorial governments, and exercises with Federal and non-Federal entities;
the impact of incidents that have affected State, local, Tribal, and territorial governments, including the resulting costs to such governments;
the information related to the interest and ability of state and non-state threat actors to compromise information systems owned or operated by State, local, Tribal, and territorial governments;
emerging cybersecurity risks and cybersecurity threats to State, local, Tribal, and territorial governments resulting from the deployment of new technologies; and
recommendations made by the State and Local Cybersecurity Resilience Committee.
Responsibilities of the Director of the Cybersecurity and Infrastructure Security Agency
Subsection (c) of section 2202 of the Homeland Security Act of 2002 ( 6 U.S.C. 652 ) is amended—
by redesignating paragraphs (6) through (11) as paragraphs (11) through (16), respectively; and
by inserting after paragraph (5) the following new paragraphs:
develop program guidance, in consultation with the State and Local Government Cybersecurity Resiliency Committee established under section 2215, for the State and Local Cybersecurity Grant Program under such section or any other homeland security assistance administered by the Department to improve cybersecurity;
review, in consultation with the State and Local Cybersecurity Resiliency Committee, all cybersecurity plans of State, local, Tribal, and territorial governments developed pursuant to any homeland security assistance administered by the Department to improve cybersecurity;
provide expertise and technical assistance to State, local, Tribal, and territorial government officials with respect to cybersecurity;
provide education, training, and capacity development to enhance the security and resilience of cybersecurity and infrastructure security;
provide information to State, local, Tribal, and territorial governments on the security benefits of .gov domain name registration services;
Not later than 180 days after the date of the enactment of this Act, the Director shall conduct a study to assess the feasibility of implementing a short-term rotational program for the detail of approved State, local, Tribal, and territorial government employees in cyber workforce positions to the Agency.
GovTrack helps everyone learn about and track the activities of the United States Congress. Launched more than 20 years ago, we’re one of the oldest government transparency and accountability websites on the Internet.
This is a project of Civic Impulse, LLC. GovTrack.us is not a government website.