Opportunity ID: 349776

General Information

Document Type: Grants Notice
Funding Opportunity Number: DHS-23-GPD-137-00-01
Funding Opportunity Title: Fiscal Year (FY) 2023 State and Local Cybersecurity Grant Program
Opportunity Category: Other
Opportunity Category Explanation: Grant
Funding Instrument Type: Grant
Category of Funding Activity: Other (see text field entitled “Explanation of Other Category of Funding Activity” for clarification)
Category Explanation: Infrastructure Investment and Jobs Act
Expected Number of Awards: 56
Assistance Listings: 97.137 — State and Local Cybersecurity Grant Program Tribal Cybersecurity Grant Program
Cost Sharing or Matching Requirement: No
Version: Synopsis 3
Posted Date: Aug 07, 2023
Last Updated Date: Aug 07, 2023
Original Closing Date for Applications: Oct 06, 2023
Current Closing Date for Applications: Oct 06, 2023
Archive Date: Nov 06, 2023
Estimated Total Program Funding: $374,981,324
Award Ceiling: $374,981,324
Award Floor: $500,000

Eligibility

Eligible Applicants: State governments
Additional Information on Eligibility:

Additional Information

Agency Name: Department of Homeland Security – FEMA
Description:

A Cybersecurity Plan of an eligible entity shall — –(A) incorporate, to the extent practicable — –(i) any existing plans of the eligible entity to protect against cybersecurity risks and cybersecurity threats to information systems owned or operated by, or on behalf of, State, local, or Tribal governments; and -(ii) if the eligible entity is a State, consultation and feedback from local governments and associations of local governments within the jurisdiction of the eligible entity; –(B) describe, to the extent practicable, how the eligible entity will — –(i) manage, monitor, and track information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, and the information technology deployed on those information systems, including legacy information systems and information technology that are no longer supported by the manufacturer of the systems or technology; –(ii) monitor, audit, and, track network traffic and activity transiting or traveling to or from information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(iii) enhance the preparation, response, and resiliency of information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, against cybersecurity risks and cybersecurity threats; –(iv) implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats on information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(v) ensure that the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, adopt and use best practices and methodologies to enhance cybersecurity, such as — –(I) the practices set forth in the cybersecurity framework developed by the National Institute of Standards and Technology; –(II) cyber chain supply chain risk management best practices identified by the National Institute of Standards and Technology; and –(III) knowledge bases of adversary tools and tactics; –(vi) promote the delivery of safe, recognizable, and trustworthy online services by the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including through the use of the .gov internet domain; –(vii) ensure continuity of operations of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, in the event of a cybersecurity incident, including by conducting exercises to practice responding to a cybersecurity incident; –(viii) use the National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity developed by the National Institute of Standards and Technology to identify and mitigate any gaps in the cybersecurity workforces of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, enhance recruitment and retention efforts for those workforces, and bolster the knowledge, skills, and abilities of personnel of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, to address cybersecurity risks and cybersecurity threats, such as through cybersecurity hygiene training; –(ix) if the eligible entity is a State, ensure continuity of communications and data networks within the jurisdiction of the eligible entity between the eligible entity and local governments within the jurisdiction of the eligible entity in the event of an incident involving those communications or data networks; –(x) assess and mitigate, to the greatest degree possible, cybersecurity risks and cybersecurity threats relating to critical infrastructure and key resources, the degradation of which may impact the performance of information systems within the jurisdiction of the eligible entity; –(xi) enhance capabilities to share cyber threat indicators and related information between the eligible entity and — –(I) if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including by expanding information sharing agreements with the Department; and –(II) the Department; –(xii) leverage cybersecurity services offered by the Department; –(xiii) implement an information technology and operational technology modernization cybersecurity review process that ensures alignment between information technology and operational technology cybersecurity objectives; –(xiv) develop and coordinate strategies to address cybersecurity risks and cybersecurity threats in consultation with — –(I) if the eligible entity is a State, local governments and associations of local governments within the jurisdiction of the eligible entity; and –(II) as applicable — –(aa) eligible entities that neighbor the jurisdiction of the eligible entity or, as appropriate, members of an information sharing and analysis organization; and –(bb) countries that neighbor the jurisdiction of the eligible entity; –(xv) ensure adequate access to, and participation in, the services and programs described in this subparagraph by rural areas within the jurisdiction of the eligible entity; and –(xvi) distribute funds, items, services, capabilities, or activities to local governments under subsection (n)(2)(A), including the fraction of that distribution the eligible entity plans to distribute to rural areas under subsection (n)(2)(B); –(C) assess the capabilities of the eligible entity relating to the actions described in subparagraph (B); –(D) describe, as appropriate and to the extent practicable, the individual responsibilities of the eligible entity and local governments within the jurisdiction of the eligible entity in implementing the plan; –(E) outline, to the extent practicable, the necessary resources and a timeline for implementing the plan; and –(F) describe the metrics the eligible entity will use to measure progress towards — –(i) implementing the plan; and –(ii) reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity.

Link to Additional Information: NDGrants@fema.dhs.gov
Grantor Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

ND Grants Service Desk

Phone: 1-800-865-4076

E-mail: NDGrants@fema.dhs.gov
Email:NDGrants@fema.dhs.gov

Version History

Version Modification Description Updated Date
Updated Opportunity Details. Aug 07, 2023
Updated synopsis. Aug 07, 2023
Aug 07, 2023

DISPLAYING: Synopsis 3

General Information

Document Type: Grants Notice
Funding Opportunity Number: DHS-23-GPD-137-00-01
Funding Opportunity Title: Fiscal Year (FY) 2023 State and Local Cybersecurity Grant Program
Opportunity Category: Other
Opportunity Category Explanation: Grant
Funding Instrument Type: Grant
Category of Funding Activity: Other (see text field entitled “Explanation of Other Category of Funding Activity” for clarification)
Category Explanation: Infrastructure Investment and Jobs Act
Expected Number of Awards: 56
Assistance Listings: 97.137 — State and Local Cybersecurity Grant Program Tribal Cybersecurity Grant Program
Cost Sharing or Matching Requirement: No
Version: Synopsis 3
Posted Date: Aug 07, 2023
Last Updated Date: Aug 07, 2023
Original Closing Date for Applications: Oct 06, 2023
Current Closing Date for Applications: Oct 06, 2023
Archive Date: Nov 06, 2023
Estimated Total Program Funding: $374,981,324
Award Ceiling: $374,981,324
Award Floor: $500,000

Eligibility

Eligible Applicants: State governments
Additional Information on Eligibility:

Additional Information

Agency Name: Department of Homeland Security – FEMA
Description:

A Cybersecurity Plan of an eligible entity shall — –(A) incorporate, to the extent practicable — –(i) any existing plans of the eligible entity to protect against cybersecurity risks and cybersecurity threats to information systems owned or operated by, or on behalf of, State, local, or Tribal governments; and -(ii) if the eligible entity is a State, consultation and feedback from local governments and associations of local governments within the jurisdiction of the eligible entity; –(B) describe, to the extent practicable, how the eligible entity will — –(i) manage, monitor, and track information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, and the information technology deployed on those information systems, including legacy information systems and information technology that are no longer supported by the manufacturer of the systems or technology; –(ii) monitor, audit, and, track network traffic and activity transiting or traveling to or from information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(iii) enhance the preparation, response, and resiliency of information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, against cybersecurity risks and cybersecurity threats; –(iv) implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats on information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(v) ensure that the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, adopt and use best practices and methodologies to enhance cybersecurity, such as — –(I) the practices set forth in the cybersecurity framework developed by the National Institute of Standards and Technology; –(II) cyber chain supply chain risk management best practices identified by the National Institute of Standards and Technology; and –(III) knowledge bases of adversary tools and tactics; –(vi) promote the delivery of safe, recognizable, and trustworthy online services by the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including through the use of the .gov internet domain; –(vii) ensure continuity of operations of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, in the event of a cybersecurity incident, including by conducting exercises to practice responding to a cybersecurity incident; –(viii) use the National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity developed by the National Institute of Standards and Technology to identify and mitigate any gaps in the cybersecurity workforces of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, enhance recruitment and retention efforts for those workforces, and bolster the knowledge, skills, and abilities of personnel of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, to address cybersecurity risks and cybersecurity threats, such as through cybersecurity hygiene training; –(ix) if the eligible entity is a State, ensure continuity of communications and data networks within the jurisdiction of the eligible entity between the eligible entity and local governments within the jurisdiction of the eligible entity in the event of an incident involving those communications or data networks; –(x) assess and mitigate, to the greatest degree possible, cybersecurity risks and cybersecurity threats relating to critical infrastructure and key resources, the degradation of which may impact the performance of information systems within the jurisdiction of the eligible entity; –(xi) enhance capabilities to share cyber threat indicators and related information between the eligible entity and — –(I) if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including by expanding information sharing agreements with the Department; and –(II) the Department; –(xii) leverage cybersecurity services offered by the Department; –(xiii) implement an information technology and operational technology modernization cybersecurity review process that ensures alignment between information technology and operational technology cybersecurity objectives; –(xiv) develop and coordinate strategies to address cybersecurity risks and cybersecurity threats in consultation with — –(I) if the eligible entity is a State, local governments and associations of local governments within the jurisdiction of the eligible entity; and –(II) as applicable — –(aa) eligible entities that neighbor the jurisdiction of the eligible entity or, as appropriate, members of an information sharing and analysis organization; and –(bb) countries that neighbor the jurisdiction of the eligible entity; –(xv) ensure adequate access to, and participation in, the services and programs described in this subparagraph by rural areas within the jurisdiction of the eligible entity; and –(xvi) distribute funds, items, services, capabilities, or activities to local governments under subsection (n)(2)(A), including the fraction of that distribution the eligible entity plans to distribute to rural areas under subsection (n)(2)(B); –(C) assess the capabilities of the eligible entity relating to the actions described in subparagraph (B); –(D) describe, as appropriate and to the extent practicable, the individual responsibilities of the eligible entity and local governments within the jurisdiction of the eligible entity in implementing the plan; –(E) outline, to the extent practicable, the necessary resources and a timeline for implementing the plan; and –(F) describe the metrics the eligible entity will use to measure progress towards — –(i) implementing the plan; and –(ii) reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity.

Link to Additional Information: NDGrants@fema.dhs.gov
Grantor Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

ND Grants Service Desk

Phone: 1-800-865-4076

E-mail: NDGrants@fema.dhs.gov
Email:NDGrants@fema.dhs.gov

DISPLAYING: Synopsis 2

General Information

Document Type: Grants Notice
Funding Opportunity Number: DHS-23-GPD-137-00-01
Funding Opportunity Title: Fiscal Year (FY) 2023 State and Local Cybersecurity Grant Program
Opportunity Category: Discretionary
Opportunity Category Explanation:
Funding Instrument Type: Grant
Category of Funding Activity: Other (see text field entitled “Explanation of Other Category of Funding Activity” for clarification)
Category Explanation: Infrastructure Investment and Jobs Act
Expected Number of Awards: 56
Assistance Listings: 97.137 — State and Local Cybersecurity Grant Program Tribal Cybersecurity Grant Program
Cost Sharing or Matching Requirement: No
Version: Synopsis 2
Posted Date: Aug 07, 2023
Last Updated Date: Aug 07, 2023
Original Closing Date for Applications:
Current Closing Date for Applications: Oct 06, 2023
Archive Date: Nov 06, 2023
Estimated Total Program Funding: $374,981,324
Award Ceiling: $374,981,324
Award Floor: $500,000

Eligibility

Eligible Applicants: State governments
Additional Information on Eligibility:

Additional Information

Agency Name: Department of Homeland Security – FEMA
Description:

A Cybersecurity Plan of an eligible entity shall — –(A) incorporate, to the extent practicable — –(i) any existing plans of the eligible entity to protect against cybersecurity risks and cybersecurity threats to information systems owned or operated by, or on behalf of, State, local, or Tribal governments; and -(ii) if the eligible entity is a State, consultation and feedback from local governments and associations of local governments within the jurisdiction of the eligible entity; –(B) describe, to the extent practicable, how the eligible entity will — –(i) manage, monitor, and track information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, and the information technology deployed on those information systems, including legacy information systems and information technology that are no longer supported by the manufacturer of the systems or technology; –(ii) monitor, audit, and, track network traffic and activity transiting or traveling to or from information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(iii) enhance the preparation, response, and resiliency of information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, against cybersecurity risks and cybersecurity threats; –(iv) implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats on information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(v) ensure that the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, adopt and use best practices and methodologies to enhance cybersecurity, such as — –(I) the practices set forth in the cybersecurity framework developed by the National Institute of Standards and Technology; –(II) cyber chain supply chain risk management best practices identified by the National Institute of Standards and Technology; and –(III) knowledge bases of adversary tools and tactics; –(vi) promote the delivery of safe, recognizable, and trustworthy online services by the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including through the use of the .gov internet domain; –(vii) ensure continuity of operations of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, in the event of a cybersecurity incident, including by conducting exercises to practice responding to a cybersecurity incident; –(viii) use the National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity developed by the National Institute of Standards and Technology to identify and mitigate any gaps in the cybersecurity workforces of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, enhance recruitment and retention efforts for those workforces, and bolster the knowledge, skills, and abilities of personnel of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, to address cybersecurity risks and cybersecurity threats, such as through cybersecurity hygiene training; –(ix) if the eligible entity is a State, ensure continuity of communications and data networks within the jurisdiction of the eligible entity between the eligible entity and local governments within the jurisdiction of the eligible entity in the event of an incident involving those communications or data networks; –(x) assess and mitigate, to the greatest degree possible, cybersecurity risks and cybersecurity threats relating to critical infrastructure and key resources, the degradation of which may impact the performance of information systems within the jurisdiction of the eligible entity; –(xi) enhance capabilities to share cyber threat indicators and related information between the eligible entity and — –(I) if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including by expanding information sharing agreements with the Department; and –(II) the Department; –(xii) leverage cybersecurity services offered by the Department; –(xiii) implement an information technology and operational technology modernization cybersecurity review process that ensures alignment between information technology and operational technology cybersecurity objectives; –(xiv) develop and coordinate strategies to address cybersecurity risks and cybersecurity threats in consultation with — –(I) if the eligible entity is a State, local governments and associations of local governments within the jurisdiction of the eligible entity; and –(II) as applicable — –(aa) eligible entities that neighbor the jurisdiction of the eligible entity or, as appropriate, members of an information sharing and analysis organization; and –(bb) countries that neighbor the jurisdiction of the eligible entity; –(xv) ensure adequate access to, and participation in, the services and programs described in this subparagraph by rural areas within the jurisdiction of the eligible entity; and –(xvi) distribute funds, items, services, capabilities, or activities to local governments under subsection (n)(2)(A), including the fraction of that distribution the eligible entity plans to distribute to rural areas under subsection (n)(2)(B); –(C) assess the capabilities of the eligible entity relating to the actions described in subparagraph (B); –(D) describe, as appropriate and to the extent practicable, the individual responsibilities of the eligible entity and local governments within the jurisdiction of the eligible entity in implementing the plan; –(E) outline, to the extent practicable, the necessary resources and a timeline for implementing the plan; and –(F) describe the metrics the eligible entity will use to measure progress towards — –(i) implementing the plan; and –(ii) reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity.

Link to Additional Information: NDGrants@fema.dhs.gov
Grantor Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

ND Grants Service Desk

Phone: 1-800-865-4076

E-mail: NDGrants@fema.dhs.gov
Email:NDGrants@fema.dhs.gov

DISPLAYING: Synopsis 1

General Information

Document Type: Grants Notice
Funding Opportunity Number: DHS-23-GPD-137-00-01
Funding Opportunity Title: Fiscal Year (FY) 2023 State and Local Cybersecurity Grant Program
Opportunity Category: Discretionary
Opportunity Category Explanation:
Funding Instrument Type: Grant
Category of Funding Activity: Other (see text field entitled “Explanation of Other Category of Funding Activity” for clarification)
Category Explanation: Infrastructure Investment and Jobs Act
Expected Number of Awards: 56
Assistance Listings: 97.137 — State and Local Cybersecurity Grant Program Tribal Cybersecurity Grant Program
Cost Sharing or Matching Requirement: No
Version: Synopsis 1
Posted Date: Aug 07, 2023
Last Updated Date: Aug 07, 2023
Original Closing Date for Applications:
Current Closing Date for Applications: Oct 06, 2023
Archive Date: Nov 06, 2023
Estimated Total Program Funding: $374,981,324
Award Ceiling: $374,981,324
Award Floor: $500,000

Eligibility

Eligible Applicants: State governments
Additional Information on Eligibility:

Additional Information

Agency Name: Department of Homeland Security – FEMA
Description: A Cybersecurity Plan of an eligible entity shall — –(A) incorporate, to the extent practicable — –(i) any existing plans of the eligible entity to protect against cybersecurity risks and cybersecurity threats to information systems owned or operated by, or on behalf of, State, local, or Tribal governments; and -(ii) if the eligible entity is a State, consultation and feedback from local governments and associations of local governments within the jurisdiction of the eligible entity; –(B) describe, to the extent practicable, how the eligible entity will — –(i) manage, monitor, and track information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, and the information technology deployed on those information systems, including legacy information systems and information technology that are no longer supported by the manufacturer of the systems or technology; –(ii) monitor, audit, and, track network traffic and activity transiting or traveling to or from information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(iii) enhance the preparation, response, and resiliency of information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, against cybersecurity risks and cybersecurity threats; –(iv) implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats on information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; –(v) ensure that the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, adopt and use best practices and methodologies to enhance cybersecurity, such as — –(I) the practices set forth in the cybersecurity framework developed by the National Institute of Standards and Technology; –(II) cyber chain supply chain risk management best practices identified by the National Institute of Standards and Technology; and –(III) knowledge bases of adversary tools and tactics; –(vi) promote the delivery of safe, recognizable, and trustworthy online services by the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including through the use of the .gov internet domain; –(vii) ensure continuity of operations of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, in the event of a cybersecurity incident, including by conducting exercises to practice responding to a cybersecurity incident; –(viii) use the National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity developed by the National Institute of Standards and Technology to identify and mitigate any gaps in the cybersecurity workforces of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, enhance recruitment and retention efforts for those workforces, and bolster the knowledge, skills, and abilities of personnel of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, to address cybersecurity risks and cybersecurity threats, such as through cybersecurity hygiene training; –(ix) if the eligible entity is a State, ensure continuity of communications and data networks within the jurisdiction of the eligible entity between the eligible entity and local governments within the jurisdiction of the eligible entity in the event of an incident involving those communications or data networks; –(x) assess and mitigate, to the greatest degree possible, cybersecurity risks and cybersecurity threats relating to critical infrastructure and key resources, the degradation of which may impact the performance of information systems within the jurisdiction of the eligible entity; –(xi) enhance capabilities to share cyber threat indicators and related information between the eligible entity and — –(I) if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including by expanding information sharing agreements with the Department; and –(II) the Department; –(xii) leverage cybersecurity services offered by the Department; –(xiii) implement an information technology and operational technology modernization cybersecurity review process that ensures alignment between information technology and operational technology cybersecurity objectives; –(xiv) develop and coordinate strategies to address cybersecurity risks and cybersecurity threats in consultation with — –(I) if the eligible entity is a State, local governments and associations of local governments within the jurisdiction of the eligible entity; and –(II) as applicable — –(aa) eligible entities that neighbor the jurisdiction of the eligible entity or, as appropriate, members of an information sharing and analysis organization; and –(bb) countries that neighbor the jurisdiction of the eligible entity; –(xv) ensure adequate access to, and participation in, the services and programs described in this subparagraph by rural areas within the jurisdiction of the eligible entity; and –(xvi) distribute funds, items, services, capabilities, or activities to local governments under subsection (n)(2)(A), including the fraction of that distribution the eligible entity plans to distribute to rural areas under subsection (n)(2)(B); –(C) assess the capabilities of the eligible entity relating to the actions described in subparagraph (B); –(D) describe, as appropriate and to the extent practicable, the individual responsibilities of the eligible entity and local governments within the jurisdiction of the eligible entity in implementing the plan; –(E) outline, to the extent practicable, the necessary resources and a timeline for implementing the plan; and –(F) describe the metrics the eligible entity will use to measure progress towards — –(i) implementing the plan; and –(ii) reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity.
Link to Additional Information: https://www.grants.gov/
Grantor Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

Systems, GPD
GMD-Systems-Branch@fema.gov
Email:GMD-Systems-Branch@fema.gov

Folder 349776 Full Announcement-Notice of Funding Opportunity -> FY2023 SLCGP NOFO_OMB approved_508c_FINAL_08.08.23.pdf

Folder 349776 Other Supporting Documents-Other Supporting Documents -> SLCGP IJ FEMA Form FF-008-FY-23-103_Final.pdf

Folder 349776 Other Supporting Documents-Other Supporting Documents -> User Guide Template_Project Worksheet_508 FINAL 7.11.23.pdf

Folder 349776 Other Supporting Documents-Other Supporting Documents -> User Guide Template_Investment Justification_508 FINAL 7.11.23.pdf

Folder 349776 Other Supporting Documents-Other Supporting Documents -> SLCGP PW FF-008-FY-23-104_Final.pdf

Packages

Agency Contact Information: ND Grants Service Desk
Phone: 1-800-865-4076
E-mail: NDGrants@fema.dhs.gov
Email: NDGrants@fema.dhs.gov
Who Can Apply: Organization Applicants

Assistance Listing Number Competition ID Competition Title Opportunity Package ID Opening Date Closing Date Actions
97.137 PKG00282789 Aug 07, 2023 Oct 06, 2023 View

Package 1

Mandatory forms

349776 SF424_4_0-4.0.pdf

349776 GG_LobbyingForm-1.1.pdf

2025-07-11T08:35:50-05:00

Share This Post, Choose Your Platform!

About the Author: