Multi-State Information Sharing and Analysis Center

The MS-ISAC is a key resource for significantly enhancing State, local, tribal and territorial governments? cyber security posture by providing enhanced expertise, information sharing, and operational support.

This centralized approach also leverages the economies of scale thereby maximizing the
utilization of scarce state resources to protect the critical systems.

The MS-ISAC also manages a 24x7x365 cyber security operations center.

Agency - Department of Homeland Security

The Department of Homeland Security has three primary missions: Prevent terrorist attacks within the United States, reduce America's vulnerability to terrorism and minimize the damage from potential attacks and natural disasters.

Website Address

http://www.dhs.gov




Program Accomplishments

Fiscal Year 2016: ? Completing monitoring expansion to all 56 States and Territories ? Increased membership by 31.5% ? Number of MS-ISAC CERT engagements 169 in 2014, 164 in 2015 and 171 in 2016 An Engagement is assisting an SLTT with a cyber incident. This typically may include one, or all of the following: log analysis, malware analysis and full forensics review of the suspect system (s) and remediation recommendations. ? Increased local participation in the NCSR by 103% ? Increased automated indicator sharing by 157% (from 33 to 85 entities) This is the number of entities that are connected to the automated indicator sharing platform (Soltra Edge) which includes DHS. ? Promoting DHS Programs such as NCATS, Cyber Security Exercises, Cyber Security Advisors, distribute DHS materials, etc. to the MS-ISAC members and conference attendees across the country. ? Increased products covered by VMP by 142% (from 7 products to 17) ? Increased threat actor tracking by 81% (from 326 to 591 actors) The threat actor tracking enables us to identify TTPs which are available to all MS-ISAC analysts. The analysts use this information in analyzing and providing assessment of threats and responding attacks impacting SLTTs. Threat actor tracking in also used to develop signatures that are deployed to Albert devices. The information is also used in reports provided to members. ? Analyzing the use of cloud services for data analysis. The size and scale of our Netflow data repository has exceeded our ability to provide timely enterprise analysis of the data. A query of all of our Netflow data can take up to a week with our current platform. We are analyzing different options to see if a cost effect solution can be found. We have meetings/discussions scheduled with US-CERT, Carnegie Melon, DARPA, cloud providers and data analysis tool providers to assess what the options are. ? Expanded membership partnerships by holding 3 Open Houses (7 to 10 members on-site for a 2 day exchange program ? Support State ISAO initiatives We have products and tools that would be valuable for the state ISAOs that are forming to support critical infrastructure owners and operators in their respective states. One of the first questions by any prospective ISAO member is, ?how can you help me?? We can assist with that. For example, if a state provided us with the IPs and domains of its CI partners, we could add them to our databases and notify the state ISAO regarding vulnerable domains, compromised credentials, connections to sink holes, etc., belonging to their ISAO members. They would also re-distribute all of the DHS and FBI products that we currently send to members. This will be a tremendous value add, which should encourage CI owners and operators to see the value of joining the state ISAO. Fiscal Year 2017: ? Sustain monitoring of all 56 States and Territories ? Increasing membership by 20% ? Increasing CERT engagements by 10% ? Increasing participation in the NCSR by 20% ? Increasing automated indicator sharing by 20% ? Promoting DHS Programs ? Increasing products covered by VMP ? Expand threat actor tracking ? Expanding Membership partnerships to include staff exchange program ? Support State ISAO initiatives. Fiscal Year 2018: Sustain monitoring of all 56 States and Territories ? Increasing membership by 20% ? Increasing CERT engagements by 10% ? Increasing participation in the NCSR by 20% ? Increasing automated indicator sharing by 20% ? Promoting DHS Programs ? Increasing products covered by VMP ? Expand threat actor tracking ? Expanding Membership partnerships ? Support State ISAO initiatives.

Uses and Use Restrictions

Restricted to supporting the activities of the Multi-State Information Sharing and Analysis Center (MS-ISAC), involving engagement with State, Tribal and local governments.

Additional information concerning uses and restrictions is contained in the Funding Opportunity Announcement document or can be obtained from the administering program office identified in this announcement.

Financial and nonfinancial assistance may be provided for the following: salaries, materials and supplies, equipment, travel, publication costs, subcontractor and supporting costs required for technical and other activities necessary to achieve the objective.

Restrictions on use of funds will be identified in the funding opportunity announcement and award provisions.

See Funding Opportunity Announcement.

Refer to program guidance.

Refer to program guidance.

Refer to program guidance.

Refer to program guidance.

Eligibility Requirements

Applicant Eligibility

This funding opportunity is restricted to the Multi-State Information Sharing and Analysis Center (MS-ISAC).

Specific information on applicant eligibility is identified in the funding opportunity announcement.

Beneficiary Eligibility

State Governments, local government, territorial governments, tribal governments and territories.

Credentials/Documentation

Refer to Section 140: Regulations, Guidelines, and Literature. 2 CFR 200, Subpart E - Cost Principles applies to this program.

Aplication and Award Process

Preapplication Coordination

Preapplication coordination is not applicable.

Environmental impact information is not required for this program.

This program is excluded from coverage under E.O.

12372.

Application Procedures

2 CFR 200, Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards applies to this program. Application deadline and other information are contained in the application.

Award Procedures

Applications or plans are reviewed by DHS program and administrative staff. Any issues or concerns noted in the application will be negotiated with the successful applicant prior to the award being issued.

Deadlines

Contact the headquarters or regional office, as appropriate, for application deadlines.

Authorization

Homeland Security Act of 2002, Title II, 6 U.S.C 121(d); Consolidated Appropriations Act, 2014, Division F, Title III, Protection, Preparedness, Response and Recovery, National Protection and Programs Directorate, Infrastructure Protection and Information Security, Title III, Public Law 113-76.

Range of Approval/Disapproval Time

Refer to Funding Opportunity Announcement.

Appeals

Not Applicable.

Renewals

Subject to future appropriations.

Assistance Considerations

Formula and Matching Requirements

Statutory formulas are not applicable to this program. Matching requirements are not applicable to this program. MOE requirements are not applicable to this program.

Length and Time Phasing of Assistance

Refer to Funding Opportunity Announcement. Awards are subject to the Cash Management Improvement Act for payment and/or reimbursement of expenditures. See the following for information on how assistance is awarded/released: Refer to Funding Opportunity Announcement.

Post Assistance Requirements

Reports

Grantees are required to submit quarterly financial and performance reports.

Quarterly ?Progress Reports? must include the progress of each sub-grant award.

Reports are due 30 days after the end of each quarter: Jan.

30, April 30, July 30, and Oct.

30.

Final financial and performance reports are due 90 days after the expiration or termination of grant award.

Grantees are required to submit a monthly report of planned, projected and disbursed funds.

Grantees are required to submit quarterly performance reports.

Quarterly ?Progress Reports? must include the progress of each sub-grant award.

Reports are due 30 days after the end of each quarter: Jan.

30, April 30, July 30, and Oct.

30.

Refer to the program guidance.

Grantees are required to submit a monthly report of planned, projected and disbursed funds.

Grantees are required to submit a monthly report of planned, projected and disbursed funds.

Audits

In accordance with the provisions of 2 CFR 200, Subpart F - Audit Requirements, non-Federal entities that expend financial assistance of $750,000 or more in Federal awards will have a single or a program-specific audit conducted for that year. Non-Federal entities that expend less than $750,000 a year in Federal awards are exempt from Federal audit requirements for that year, except as noted in 2 CFR 200.503.

Records

Grant records shall be retained for a period of 3 years from the day the recipient submits its final expenditure report. If any litigation, claim, negotiation, audit, or other action involving the records has been started before the expiration of the 3-year period, the records must be retained until completion of the action and resolution of all issues which arise from it, or until the end of the regular 3-year period, whichever is later. Grant records include financial and program/progress reports, support documents, statistical records, and other documents that support the activity and/or expenditure of the recipient or sub-recipient under the award.

Financial Information

Account Identification

70-0565-0-1-999.

Obigations

(Salaries) FY 16 $9,500,000; FY 17 est $9,000,000; and FY 18 est $9,000,000

Range and Average of Financial Assistance

Refer to Funding Opportunity Announcement.

Regulations, Guidelines, and Literature

44 CFR Part 13, Uniform Administrative Requirements for Grants and Cooperative Agreements to State and Local Governments,A-87, Cost Principles for State, Local and Indian Tribal Governments (2 CFR Part 225), A-110, Uniform Administrative Requirements for Grants and Agreements with Institutions of Higher Education, Hospitals and Non-Profit Organizations (2 CFR Part 215), A-21, Cost Principles for Educational Institutions (2 CFR Part 220), A-122, Cost Principles for Non-Profit Organizations (iii. 2 CFR Part 230), and A-133 Audits of States, Local Governments, and Non-Profit Organizations, in addition to program regulations, guidelines, DHS policy and procedure.

Information Contacts

Regional or Local Office

None.

Headquarters Office

Eric Goldstein or Kirsten Heidelberg 245 Murray Lane, SW, Mail Stop 0115 Attention: 720-A, Washington, District of Columbia 20528 Email: eric.goldstein@hq.dhs.gov;kirsten.heidelberg@hq.dhs.gov Phone: (703) 235-5324 or (703) 235-5716

Criteria for Selecting Proposals

This funding opportunity is restricted to the for Security Multi-State Information Sharing and Analysis Center (MS-ISAC). Specific information on criteria for selecting proposals is identified in the funding opportunity announcement.



Social Entrepreneurship
Spotlight



Works Progress Welcomes Philanthropic Punk and Proud Father

Works Progress Welcomes Philanthropic Punk and Proud Father
Comedy punk band Warning: Danger guitarist and Seattle native, Eric Bruckbauer, has joined the Works Progress community, a “coworking” or flexible...



Social Services Jobs in Puerto Rico

  Executive Director Jobs
  Foundation Related Jobs
  Program Director Jobs
  Social Work Jobs
  Education Jobs





More Federal Domestic Assistance Programs


Promoting Population Health through Increased Capacity in Alcohol Epidemiology | Juvenile Reentry Assistance Program Juvenile Reentry Assistance Program (JRAP) | Longshore and Harbor Workers' Compensation | Environmental Finance Center Grants | Environmental Quality and Protection |  Site Style by YAML | Grants.gov | Grants | Grants News | Sitemap | Privacy Policy


Edited by: Michael Saunders

© 2004-2018 Copyright Michael Saunders