• Skip to main content
  • Skip to footer

Commonwealth Sentinel

Cyber Security for local government, non-profits and small business

MENUMENU
  • Home
  • About Us
    • Sheri Donahue
    • Leo Haggerty
    • Careers
  • Services
    • Vulnerability and Threat Evaluation
    • Transformation Management
    • CISO Management Services
    • Incident Response Management
  • News
  • Blog
  • FAQs
  • Contact Us

commonsent / March 9, 2023

You got a Cyber Security Grant… Now, What do You do?

The letters to the recipients of the DHS State and Local Cyber Security Grant Program (SLCGP) should be released any day now. Yes, I know we have been hearing that since December, but realistically speaking, it really should be soon. It has to be because soon since CISA will have to announce details for Year 2 in the next few months.

The good news is that the Kentucky Office of Homeland Security Cybersecurity Grants Committee got all their submissions in on time, PLUS Kentucky is one of only 11 states that has submitted the state cyber security plan required for the grant to be released. (Way to go, KOHS!)

While we don’t yet know which of the grant applications were submitted by the state, we can at least plan for when the notifications are made.

If your county, AD district, school district, or organization is one of the grant recipients (or you receive another grant), the first thing to do is celebrate. But not for long. There’s work to do, for crying out loud!

You likely already outlined in your grant application the objectives you will be working toward in general terms. However, more specifically, you need to plan your steps.

First, identify what you need to protect. When I worked for the Navy in program protection for the new destroyer program in the mid-90s, we knew that we could not protect every aspect of the program from discovery. For one thing, satellite imagery would clearly show that shipyards were working to build a new ship. But there were new technologies that we definitely needed to protect. Those are the ones we focused on protecting. Our “crown jewels.”

Similarly, you should determine what things are critical to your organization. Employee data, student/client/citizen data, 9-1-1 center operations? Knowing what is most critical to your operations will inform you on how to proceed…where to put your protective measures.

Determining how to protect your crown jewels will be best addressed by doing a vulnerability assessment to find the holes in your network. Maybe it is in patches that have not been implemented, or maybe the configuration or your architecture is flawed. It could be in the policies and procedures you need to implement, your staff training, development of incident response plans, etc.

Penetration testing will provide insight into how a threat actor can infiltrate your system, so you know how to close those gaps.

From here, you will have to implement the protective measures, whether they are technical (EDR, DNS, MFA, etc.), administrative (Policies/Procedures, Incident Response Plans, training programs), or physical (door locks, cameras, etc.).

Continuous monitoring will then ensure that you stay protected and provide a method to discover any new vulnerabilities that must be addressed immediately, thereby reducing risk and harm. This includes using a Security Operations Center (SOC) for threat hunting to identify anomalous behavior and stop attacks before they happen.

Cyber security is a journey, not a destination. Let’s take that trip together. We promise we won’t ask, “are we there yet?”

Filed Under: Blog, News

Footer

CONTACT US

COMMONWEALTH SENTINEL

1230 US Highway 127 S
Suite #5
Frankfort KY 40601
(502) 320-9885

EMAIL US

ABOUT US

Cyber security consulting for local governments, non-profit organizations, and small businesses facing the threats of the cyber world.  At Commonwealth Sentinel, we are passionate about helping people be cyber-safe!

FOLLOW US

  • Email
  • Facebook
  • LinkedIn
  • Phone
  • Twitter
  • YouTube

Copyright © 2023 Commonwealth Sentinel

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT