CFDA#

|
|
Funder Type

State Government
|
IT Classification

A - Primarily intended to fund technology
|
|
|
Authority

Idaho Office of Emergency Management (IOEM)
Summary

The State and Local Cybersecurity Grant Program (SLCGP) provides funding to eligible state, local, and territorial (SLT) governments to manage and reduce systemic cyber risk, thus improving the security of critical infrastructure and improving the resilience of the services SLT governments provide their community.
Idaho Guidance:
Idaho's SLCGP Cybersecurity Plan is a multi-year strategic planning document that anticipates further SLCGP funding allocations and includes the following components:
- Vision and Mission: Articulates our state's vision and mission for improving cybersecurity resilience and interoperability over the next three years and beyond, based on additionally expected SLCGP funding that Idaho expects to receive.
- Organization, Roles, and Responsibilities: Describes the current roles and responsibilities, and governance mechanisms for cybersecurity within Idaho as well as the successes and challenges the State has experienced to date and its corresponding priorities for improvement. This component also includes a strategy for the cybersecurity program and the organization structure that identifies how the cybersecurity program is now and will be supported throughout the period of performance. This section additionally includes a governance model that identifies authorities and requirements of the State of Idaho and its county and municipal government jurisdictions for improved cybersecurity. The cybersecurity plan itself is a guiding document which does not formally create any authority or direction over any of Idaho's local systems or agencies0.
- Incorporation of Feedback and Input from Local Governments and Associations: Describes how Idaho incorporated preliminary input and will schedule additional inputs from local governments to reduce overall cybersecurity risk across the state and each eligible entity within the state, as an especially important foundation in developing this whole-of-state cybersecurity plan.
- Cybersecurity Plan Elements: Outlines technology and operations needed to maintain and enhance resilience across the cybersecurity landscape and close key gaps in the cybersecurity of all participating government jurisdictions.
- Funding: Describes funding sources and allocations to build cybersecurity capabilities within the State of Idaho along with methods and strategies for funding sustainment and enhancement to meet long-term goals.
- Implementation Plan: Describes Idaho's plan to execute, implement, sustain, and continually update and adapt the State's cybersecurity plan to enable continued evolution of and progress toward our identified goals and to keep up with the evolution of our threat, vulnerability, and gap environment. The implementation plan includes the resources to accomplish this and preliminary timelines where practicable.
To maximize the program's impact and due to limited resources, IOEM delivers best practice cybersecurity services in lieu of direct grant funding. The services include:
- Risk Assessment and Gap Management: Conducting assessments like the NCSR to identify vulnerabilities and develop mitigation strategies.
- Cybersecurity Governance and Planning: Assisting with the establishment of governance structures, cybersecurity policies, and response plans.
- Cybersecurity Training: Providing training programs to enhance local staff's skills and response capabilities.
History of Funding

The State of Idaho was allocated a total of $3,899,009 for FY24.
The State of Idaho was allocated a total of $6,228,366 for FY23.
The State of Idaho was allocated a total of $3,949,173 for FY22.
Additional Information

Any entity that receives funds from a grant under this program may not use the grant:
- Supplanting state or local funds;
- Recipient cost-sharing contributions;
- Payment of a ransom from cyberattacks;
- Recreational or social purposes, or for any purpose that does not address cybersecurity risks or cybersecurity threats on SLTT information systems;
- Lobbying or intervention in federal regulatory or adjudicatory proceedings;
- Suing the federal government or any other government entity;
- Acquiring land or constructing, remodeling or altering buildings or other physical facilities; or
- Cybersecurity Insurance; or
- Any purpose that does not address cybersecurity risks or cybersecurity threats on information systems owned or operated by, or on behalf of, the eligible entity or a local government within the jurisdiction of the eligible entity.