Cybersecurity Gap Assessment

Each grant application submitted to the State and Local Cybersecurity Grant Program (SLCGP) should address and mitigate gaps in the applicant's cybersecurity posture. Identifying those gaps is a crucial first step. This form will help you get a better understanding of your organization's current posture and what type of project(s) you can apply for under the SLCGP to improve cybersecurity within your organization over the four year life of this grant.


One of the main principals in cybersecurity is defense in depth. What this basically means is (more improvements = more protection). This is a continuous process and isn't so much about where you are today, but where you are going. We should all commit to making small improvements each year, knowing that we are better today than we were yesterday, but also that we have a long way to go. KOHS is happy to help on this journey in any way we can.


The results of this form will be used for two purposes.


  1. Your responses will be emailed to you. You will be able to use the information provided in your (SLCGP) application.
  2. Responses from all applicants will be summarized and used by KOHS to determine the overall state of KY's cybersecurity posture and provide FEMA with our state's progress toward the goals outlined in our state's cybersecurity plan as required by FEMA under the terms of this grant.


Although responses will be summarized and shared with FEMA in order for KOHS to administer this grant, individual attributed responses will not be shared without the express consent of the applicant.


Questions Contact:

Phillip Ross

Phillip.Ross@KY.gov

Cyber Intelligence Analyst

Kentucky Office of Homeland Security

Kentucky Intelligence Fusion Center

Your Information

First Last

Please do not use acronyms.

Please do not use acronyms.

Please do not use acronyms.


Cybersecurity

Select all that apply.

Nothing further is required...

Without IT or cybersecurity support you don't need to complete the remainder of this survey.


Click the blue "Submit" button below and you will receive an automated email from Phillip Ross via Smartsheet with further instructions.

STOP RIGHT THERE!!!

Only complete the remainder of this form with input from any individual(s) who help manage/maintain your organization's IT infrastructure and/or cybersecurity.

select all that apply

Select
Caret IconCaret symbol
Does your organization (via either in-house employees or a 3rd party) monitor information systems, applications and accounts?*

This may be proactive or reactive monitoring.


Monitoring includes firewall and endpoint logging and log analysis, having an intrusion detection system (IDS) or an intrusion prevention system (IPS). If any of these are in place choose "Yes".

Select
Caret IconCaret symbol
Does your organization (via either in-house employees or a 3rd party) have any way to track legacy systems within your network?*

Legacy Systems are operating systems, software and/or firmware within your environment that are no longer supported by the manufacturer (updates are no longer available). These could be tracked via a spreadsheet or dedicated software.

Does your organization (via either in-house employees or a 3rd party) have any means to monitor, audit, and track network traffic and activity.*

Monitoring includes firewall and endpoint logging, having an intrusion detection system (IDS) or an intrusion prevention system (IPS). If you have any of these choose "Yes".

Select all that apply

Have you implemented multi-factor authentication on remote systems and systems that house PII or other sensitive/mission critical information?*
Does your organization (via either in-house personnel or a 3rd party service) perform firewall or endpoint logging and/or analysis of those logs?*

Select all that apply

Select
Caret IconCaret symbol
Select
Caret IconCaret symbol

select all that apply

Select
Caret IconCaret symbol
Does your organization currently have a KY.gov or .gov email address?*

select all that apply

Select
Caret IconCaret symbol
Has your organization ever participated in a cyber tabletop exercise (TTX)?*
Is your organization currently a member of the Multi-State Information Sharing and Analysis Center (MS-ISAC)?*
Select
Caret IconCaret symbol

select all that apply

select all that apply


**Implementing cyber security standards such s NIST 800-171 or ISO/IEC 27001 are often considered best practices.

Select
Caret IconCaret symbol

You may include non-DHS/CISA courses as well, but please enter the training in the following format:


FEMA - Cybersecurity for Everyone - Jan 2022

CISA - Cyber Hygiene - May 2022

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.