CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

How Trustwave Can Assist Tribal Governments Applying for $18 Million in DHS Cybersecurity Grants

Tribal governments are among the most underserved organizations in the US when it comes to cybersecurity preparation, with threat actors striking multiple tribes with a variety of cyberattacks.

 

These include the April 2021 ransomware attacks on the Three Affiliated Tribes—the Mandan, Hidatsa, and Arikara Nation management information system. Additional attacks have targeted tribe-operated casinos. No entity is safe from a cyberattack.

 

To help alleviate this issue, the 2023 Department of Homeland Security (DHS) has created the Tribal Cybersecurity Grant Program (TCGP), this $18.2 million is designed to distribute money to tribal authorities enabling them to boost the cybersecurity and resilience of tribally owned or operated information systems.

 

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA) jointly manage the TCGP.

 

According to the CISA overview, “CISA will provide cybersecurity programmatic subject-matter expertise by defining goals and objectives, reviewing and approving cybersecurity plans to establish measures of effectiveness, and organizing Objective Review Panels to review and score applications. FEMA will provide administrative guidance through conducting eligibility reviews and issuing and administering the grant awards consistent with all applicable laws, regulations, and policies.”

 

“The TCGP funding has the ability to quickly boost a tribal government’s cybersecurity posture,” said Bill Rucker, President of Trustwave Government Solutions. “Just like any smaller community or organization, a myriad of high-priority targets operate on tribal lands in the US. These range from hospitals to local government and casinos, all needing to be secure.” 

 

All 574 federally recognized tribal governments are eligible to apply. Tribes must submit a Cybersecurity Plan, Cybersecurity Planning Committee List, and Charter by January 10, 2024, before award funding is received. The application process can take up to four weeks to complete.

 

The TCGP is similar in concept to the State and Local Cybersecurity Grant Program, which is designed to accomplish the same mission with smaller municipalities across the US. 

 

The Application Process and How Trustwave Can Help

 

In their 2023 application, a tribal government must address how it will establish cyber governance and planning within its borders, specifically how the tribe will meet the following four objectives. Trustwave Government Solutions (TGS) is perfectly positioned to assist a tribal government to meet the four TCGP objectives.

  1. Governance and Planning: Develop and establish appropriate governance structures by implementing and revising cybersecurity plans to improve capabilities to respond to cybersecurity incidents and ensure continuity of operations. 

TGS’s analyst-lauded cyber advisory services can help satisfy step one by covering all aspects of cybersecurity strategy, governance, risk, and compliance. TGS does not give advice and leave an organization but offers long-term support via services like virtual CISO and subscription services such as Managed Vendor Risk Assessment to plan and align our clients with their long-term cyber strategies.

 

TGS begins by listening to understand how to be the most effective for your security needs. Next, we interview key personnel, review policies and processes, and curate artifacts, including previous security assessments.

 

TGS then aggregates our industry threat and trends research and schedules workshops with your team to validate findings and help shape your target state. The result is a long-term pragmatic roadmap, including quick wins and financial justifications to help gain executive buy-in.

  1. Assessment and Evaluation: Identify areas for improvement in a Tribal government’s cybersecurity posture based on continuous testing, evaluation, and structured assessments.

For step two, TGS knows managing a tribe’s locations, networks, and endpoints, securing data, and maintaining compliance can be challenging. Bad actors exploit vulnerabilities, while in-house security teams often struggle to identify the gaps and develop a roadmap for remediation or patching. 

 

However, a consistent end-to-end cybersecurity testing program will help you pinpoint known and previously unknown vulnerabilities. TGS SpiderLabs Testing provides your team with clear remediation guidance so you can strengthen your security program and protect your organization and its data.

 

Trustwave SpiderLabs certified vulnerability, penetration testing, and scenario testing experts will also work with your team to understand your current security programs and patch processes. From there, we will develop a targeted testing program to achieve your testing objectives. After the testing process, we report our findings and work with you to develop actionable remediation plans to address gaps, implement patches, and mature your security operations.

  1. Mitigation: Implement security protections commensurate with risk (outcomes of Objectives 1 and 2), using the best practices as described in element 5 of the required 13 elements of the cybersecurity plans and those further listed in the NOFO.

 TGS created a separate, US-Restricted Point of Delivery managed security service offering to accommodate the stringent security requirements associated with providing MSSP services to the Federal, State and Local, Tribal governments and defense industrial base (DIB).

This offering replicates the award-winning cloud-native Trustwave Fusion platform developed by Trustwave Holdings and modernized over the previous four years into an AWS GovCloud environment. TGS’ MSS solution leverages the same principles, processes, and procedures of our global managed security services but tailors them to the specific needs of US federal agencies that need additional security models built into the managed security solution.

  1. Workforce Development: Ensure organization personnel are appropriately trained in cybersecurity, commensurate with their responsibilities as suggested in the National Initiative for Cybersecurity Education.

Trustwave’s Consulting and Professional Services team and our Security Colony platform can develop customized or pre-prepared security awareness training specific to your environment. Annual compliance training, phishing awareness backed by phishing exercises, and deeply technical staff training are all possibilities.

 

The Trustwave SpiderLabs team has trained Federal and State Law Enforcement agencies in data collection, forensic analysis, point-of-sale system forensics, and advanced network intrusions for over 12 years. Courses are readily available to train Tribal Police and internal incident responders.

 

Fed-CyberContract-Rules-Picture1 (1)

CISA’s Three-step Grant Review Process 

 

  1. A FEMA HQ Preparedness Officer will review applications to ensure the applicant meets all eligibility requirements and check submitted applications for completeness. 
  2. CISA will organize an objective review panel and establish programmatic scoring and the selection process. Subject Matter Experts (SMEs) with cybersecurity and tribal engagement experience will serve as review panellists. Reviewers will evaluate applications, score IJs, and recommend funding within each discretionary tier. 
  3. FEMA HQ Grants Management Specialists will conduct a financial review of the top-scoring investments.

 

The TCGP allows multiple tribes to partner and apply as a tribal consortium. A tribal consortium should only submit one application for the group. The tier chosen for review of a grant application from the Tribal Consortium will be based on the highest populated tribe.

 

In the end, threat actors only look at a target to see if it’s vulnerable; attackers do not care if their activities cause harm to individuals or monetary loss. The TCGP is an excellent program that can greatly boost a tribal authority’s ability to raise its cybersecurity posture.

 

Let Trustwave Government Solutions help you become more secure.

Latest Trustwave Blogs

7-Step Guide to Properly Scoping an Offensive Security Program

Offensive security has become a cornerstone strategy for organizations aiming to fortify their defenses against cyber threats. However, before one creates a suitably developed offensive security...

Read More

Trustwave SpiderLabs Reveals the Ransomware Threats Targeting Latin American Financial and Government Sectors

Ransomware-as-a-service (RaaS) threat groups are placing severe and continuous pressure on the financial and government services sectors in Latin America, according to data compiled by the elite...

Read More

Trustwave Named a Trail Blazer in Radicati Secure Email Market Quadrant 2024 Report

Trustwave MailMarshal solidified its leadership position in the email security space, being named a Trail Blazer by the analyst firm Radicati Group in its Secure Email Market Quadrant 2024 report.

Read More