The Fact Sheets provided below align service and/or licensing information to the project offerings presented in the Alabama SLCGP Application Round 1 (FY2022-2026). The Fact Sheets (e.g., project details, providers, and product descriptions) may be updated to accommodate NOFO requirements by round changes or as the SAA determines necessary. LGE are encouraged to review each Fact Sheet prior to completion of your application(s). Although contact information may be included on some Fact Sheets, LGE should not contact service providers directly as an SAA representative will connect to you after each application is submitted and selection of projects are made. If an LGE wants guidance or more information before selecting projects or submitting their own, simply complete the application and select project #1. The SAA representative will assist the LGE and complete an application that includes additional projects catered to your needs.
LGE are encouraged to select multiple projects as a robust cybersecurity posture is a function of defense in depth. More improvements provide more protection. Where each LGE is today is less important than knowing where you need to be and setting a course of continuous process to get there. The Alabama SAA is excited to help our LGE on this journey to a more secure environment.
Project # | LGE Projects | Fact Sheet |
---|---|---|
1. | 30-Minute Guided Cybersecurity Survey and Next Steps Assessment | McCrary Institute |
2. | Advisor-led NCSR IT Assessment with POAM and Enhanced Recommendations | Deloitte |
McCrary Institute | ||
3. | Security Awareness and Phishing Training | PhishFirewall |
4. | Endpoint Detection and Response (EDR) Solution(s) | Fortinet |
5. | Routine Vulnerability Scanning | Tenable |
6. | Penetration Testing | McCrary Institute |
7. | Multi-Factor Authentication (MFA) | Cisco |
8. | Enhanced Logging (Security Information and Event Management) | Splunk |
9. | Identity and Access Management | Okta |
10. | Boundary Protection (Firewalls) | Fortinet |
11. | Network Monitoring | Fortinet |
12. | Password and Credential Management | Bitwarden |
13. | Business Continuity (Data Backup and System Recovery) | Veeam |
14. | Cybersecurity Plan and Incident Response Tabletop Exercise | McCrary Institute |