Homeland Security Committee, Cybersecurity and Infrastructure Protection Subcommittee
Introduced
In Committee
On Floor
Passed Chamber
Enacted
State and Local Cybersecurity Improvement Act This bill directs the Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security to develop a resource guide for use by state, local, and tribal officials, including law enforcement officers, to help such officials prepare for, protect against, respond to, recover from, and mitigate cyberattacks. CISA shall establish initiatives to make grants to state and local governments to (1) identify high value assets and critical system architecture in order to assess cybersecurity risks, and (2) conduct tabletop and live training exercises to assess the capability of the state or local government to respond to a cyberattack.
Get AI-generated questions to help you understand this bill better
Timeline
Introduced in House
Referred to the House Committee on Homeland Security.
Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation.
Introduced in House
Referred to the House Committee on Homeland Security.
Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation.
Government Operations and Politics
Computer security and identity theftGovernment information and archivesState and local government operations
State and Local Cybersecurity Improvement Act
USA116th CongressHR-4217| House
| Updated: 9/6/2019
State and Local Cybersecurity Improvement Act This bill directs the Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security to develop a resource guide for use by state, local, and tribal officials, including law enforcement officers, to help such officials prepare for, protect against, respond to, recover from, and mitigate cyberattacks. CISA shall establish initiatives to make grants to state and local governments to (1) identify high value assets and critical system architecture in order to assess cybersecurity risks, and (2) conduct tabletop and live training exercises to assess the capability of the state or local government to respond to a cyberattack.