Loading...
Agenda 08/12/2025 Item #16D 7 (Submittal of a grant application for Year 3 of the Local Government Cybersecurity Grant Program)8/12/2025 Item # 16.D.7 ID# 2025-2534 Executive Summary Recommendation to approve submittal of a grant application for Year 3 of the Local Government Cybersecurity Grant Program through the State of Florida Department of Management Services for an estimated value of $301,000.00 in Cybersecurity services/software for Collier County Information Technology (IT) Division. OBJECTIVE: To support Collier County’s Infrastructure and Asset Management strategic objective through development and utilization of partnerships to ensure that government facilities meet public expectations by allowing for enhanced security for the network and data infrastructure within Collier County computer systems. CONSIDERATIONS: On July 11, 2025, the Florida Department of Management Services through their Florida Digital Services (FLDS) Division announced Year 3 funding for the Local Government Cybersecurity Grant Program which aims to enhance cybersecurity resilience in local governments with a priority focus on small and fiscally constrained communities and those in rural areas of opportunity. The deadline for submission of this grant is August 31, 2025. Collier County IT Services has received both Year 1 and Year 2 funding under this grant program saving Collier County a total of $598,937.03 on cybersecurity software, such as Cisco Secure Email Appliance and Tenable One Enterprise Vulnerability Scanning, based on the Award Value provided by the State of Florida for Year 1 & 2. There are no matching funds to acquire the grant, and the State will pay the vendors for the software the County installs. The only cost is that County IT will share telemetry (metrics, structured logs, and traces) data with the State so that it is alerted if a threat is identified. This allows the State to share the vectors for that attack with other Local Government Agencies that are participating in the grant. This item is consistent with the Collier County strategic plan objective for Infrastructure and Asset Management. FISCAL IMPACT: This grant program does not require a local match, and the State will pay the vendors for the software the County installs. The County will also administer and maintain the software after installation with the current complement of staff. If awarded, IT Services is currently estimating the value of the requested services/software to be $301,000.00 and will ensure an Award Value is documented and included when brought to the Board for award acceptance. GROWTH MANAGEMENT IMPACT: There is no Growth Management impact associated with this Item. LEGAL CONSIDERATIONS: This item has been reviewed by the County Attorney, is approved as to form and legality and requires a majority vote for approval. -JAK RECOMMENDATIONS: Recommendation to approve submittal of a grant application for Year 3 of the Local Government Cybersecurity Grant Program through the State of Florida Department of Management Services for an estimated value of $301,000.00 in Cybersecurity services/software for Collier County Information Technology (IT) Division. PREPARED BY: Parker Smith, Grant Coordinator, Community & Human Services Division ATTACHMENTS: 1. DRAFT - Year_3_Local_Grant_Application_Aide_FY2025-26 2. NOFA Open Now_ Cyber Grants Application Window Page 3010 of 3949 Florida Local Government Cybersecurity Grant Application Aide 1 Florida Local Government Cybersecurity Grant Application Aide This application aide is designed to assist you by identifying the information you will need to collect to submit an official grant application through the online grants form. This document will not be accepted as a grant application. The Department of Management Services, acting through the Florida Digital Service (FLDS), is the lead entity responsible for establishing standards and processes for assessing state agency cybersecurity risks and determining appropriate security measures in the state of Florida (s. 282.318, Florida Statutes). Pursuant to section 282.3185(4), Florida Statutes, each local government shall adopt cybersecurity standards that safeguard its data, information technology, and information technology resources to ensure availability, confidentiality, and integrity. Dates for local government adoption of the cybersecurity standards and required notification to the FLDS of its compliance are also defined in section 282.3185(4), Florida Statutes. The FLDS is administering the Florida Local Government Cybersecurity Grant Program to provide assistance to Florida Local Governments for the development and enhancement of cybersecurity risk management programs. This program is funded for the 2025/26 State of Florida fiscal year; however, it is contingent upon funding approval and release. Future funding for this program is subject to legislative appropriation. Page 3011 of 3949 Florida Local Government Cybersecurity Grant Application Aide 2 * Denotes required information Organization/Applicant Information *Organization Name: *Organization Type  City  County  Clerk of Court  Property Appraiser  Sheriff’s Office  Supervisor of Elections  Tax Collector  Special District  Authority  Other *If Other, Describe Organization Type: *Organization County: *Mailing Address: *City: *Zip Code: *Main Website Address: Executive Sponsor for Grant: *Name: *Title: *Primary Phone Number: Secondary Phone Number: *Email Address Collier County IT 3299 Tamiami East Suite 601 Naples, Florida 34112 http://www.colliercountyfl.gov Mark Gillis Division Director Information Technology mark.gillis@collier.gov 2392526134 Page 3012 of 3949 Florida Local Government Cybersecurity Grant Application Aide 3 Primary Contact for Grant: *Name: *Title: *Primary Phone Number: Secondary Phone Number: *Email Address Additional Contacts - Information Technology Director: Name: Title: Primary Phone Number: Secondary Phone Number: Email Address: Additional Contacts - Chief Information Security Officer or Security Manager: Name: Title: Primary Phone Number: Secondary Phone Number: Email Address: Additional Contacts – Primary Contact for Coordination of Cybersecurity Incidents: Name: Title: Primary Phone Number: Secondary Phone Number: Email Address: Mark Gillis Division Director - Information Technology 2392526134 mark.gillis@collier.gov William A. Bouza Cyber Security Manager 2392528280 Mark Gillis Division Director - Information Technology 2392526134 mark.gillis@collier.gov William.Bouza@collier.gov Mark Gillis Division Director Information Technology 2392526134 mark.gillis@collier.gov Page 3013 of 3949 Florida Local Government Cybersecurity Grant Application Aide 4 About Your Organization: *Total number of supported users (Staff, Contractors): Total number of staff members dedicated to cybersecurity (Employees and Contractors): *Annual operating budget of organization: Total budget for cybersecurity: *Total number of physical sites/locations: Local Eligibility: *Is your organization funded or its budget approved by a county or municipality?  Yes  No *Is your organization governed by a county or municipality?  Yes  No *Is your organization governed by locally elected officials?  Yes  No Are there other reasons your organization is considered to be a local entity? If so, please explain them: 2500 4 2,966,947,300 798,100 300 N/A Page 3014 of 3949 Florida Local Government Cybersecurity Grant Application Aide 5 About Your Information Technology Environment: Does your entity provide constituent/public facing applications?  Yes  No If Yes, how many constituents/members of the public do you serve?: *Does your organization manage critical infrastructure as defined by rule 60GG-2.001(2)(a)10, F.A.C. or s. 692.201, Florida Statutes? 60GG-2.001(2)(a)10, F.A.C. | s. 692.201, Florida Statutes  Yes  No If Yes: *How many sites/locations include critical infrastructure? Provide any additional information regarding critical infrastructure as it pertains to this grant application: *Total number of supported endpoints/devices (e.g. laptops, desktops, servers, mobile devices)? Date of your most recent cybersecurity risk assessment? What is your biggest motivation(s)/ reason(s) to apply for this grant opportunity? 5000 10/09/24 404000 Type text here As a key part of our risk wide range of threats including cyberattacks, ransomware, malware, and even physical risks to our infrastructure. Our focus continues to be on identifying and addressing vulnerabilities to enhance our overall defenses. The grant provides needed improvement to counties security but also helps supports the reliable and management strategy, we’ve remained deeply committed to strengthening the Collier County network against a delivery of high-quality services to the public. Page 3015 of 3949 Florida Local Government Cybersecurity Grant Application Aide 6 Florida Cybersecurity Program Participation *Are you a current awardee and active participant in the Florida Local Government Cybersecurity Program?  Yes  No *If Yes, please provide your grant agreement number: *Have you or do you have plans for the near future to participate in the Florida Critical Infrastructure Risk Assessment? Florida Critical Infrastructure Risk Assessment  Yes  No *Are there state cybersecurity laws or rules you are out of compliance with and require financial assistance for remediation?  Yes  No If Yes, please explain: Integration with State Cybersecurity Operations Center (CSOC) The State CSOC is designed to serve as a single point of ingestion for cybersecurity data and provides a multi-tenant framework that allows for relevant data sharing while preserving the sovereignty of participating entities. This data is used to monitor and detect threats across Florida’s cybersecurity landscape. *Are you willing to integrate solutions provided through this grant into the Cybersecurity Operations Center?  Yes  No DMS-2425-099 Page 3016 of 3949 Florida Local Government Cybersecurity Grant Application Aide 7 Our Commitments to You The FLDS is committed to least privileged access because we believe in privacy and the minimum access required to administer the offered cyber capabilities and incident response, when requested. The following agreements will be delivered as two-party agreements with FLDS and your organization. They clearly describe the Florida Digital Service’s intent, limitations, and restrictions. These signed agreements between FLDS and your organization are required within 30 days after award and prior to any solution implementation. Example riders and agreements can be found on the main Local Government Cybersecurity Grant Program webpage under the “Additional Resources” section. • Grant Agreement • Grantee Data Sharing Agreement • Incident Response Rider • Software Rider(s) as needed Page 3017 of 3949 Florida Local Government Cybersecurity Grant Application Aide 8 Cybersecurity Capabilities Please tell us about the following cybersecurity capabilities as it pertains to your IT environment and if you are requesting these capabilities for your organization as part of this grant opportunity. If you have questions about any of these capabilities, please contact cybersecuritygrants@digital.fl.gov. Endpoint-Based Asset Discovery A solution focused on infrastructure which discovers network connected devices and provide a comprehensive inventory of hardware and software assets across your enterprise. Agents are typically deployed to all laptop, desktop, and server devices. *Are you requesting Endpoint-Based Asset Discovery capabilities through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment and if so, are you currently receiving it through the Florida Digital Service?  Yes, through FLDS  Yes, not through FLDS  No If Yes, has solution: *Percentage of your assets (Windows, Linux, MacOS) covered by this solution: *Name of the solution(s) you have deployed: 2500 3500 CrowdStrike Falcon Complete Page 3018 of 3949 Florida Local Government Cybersecurity Grant Application Aide 9 *Provider and product/service name of your preferred solution for this year’s grant: Select one:  Axonius Cybersecurity Asset Management  BlueVoyant Platform Bundle  MDR, SIEM and Vulnerability Scanning  CrowdStrike Falcon Discover  Divergent Endpoint Asset Discovery  Elastic  Skyline Endpoint-Based Asset Discovery Services and Technology  Forescout Technologies Inc.  Fortinet FortiClient/EMS FortiNAC  Heimdal Advanced Vulnerability Management Solution  Ivanti  LevelBlue USM  Lumen Manage Cybersecurity Asset Management  N-able N-central Remote Monitoring and Management (RMM)  Netwatch.ai  Omnissa Workspace ONE  Open Text, Corp.  SentinelOne - Singularity Vulnerability Management  SEPIO  Tanium  Tenable.IO - Vulnerability Management  Trend Micro Vision One Attack Surface Risk Management (ASRM)  No Preference *How many computer users will be covered by this capability? *How many devices in your environment (Windows, Linux, & MacOS) will be covered by this capability? *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer 3530 2500 Page 3019 of 3949 Florida Local Government Cybersecurity Grant Application Aide 10 Network-Based Asset Discovery A solution providing enterprise visibility into managed, unmanaged and Internet of Things (IoT) devices discovered via network traffic. *Are you requesting Network-Based Asset Discovery capabilities through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment and if so, are you currently receiving it through the Florida Digital Service?  Yes, through FLDS  Yes, not through FLDS  No If Yes, has solution: *Percentage of your assets covered by this solution: *Name of the solution(s) you have deployed: 90% Tenable One Enterprise Page 3020 of 3949 Florida Local Government Cybersecurity Grant Application Aide 11 *Provider and product/service name of your preferred solution:  Akamai Technologies  Armis Centrix  Axonius Cybersecurity Asset Management  BlueVoyant Standard Vulnerability Scanning  Check Point Infinity Network Detection and Response (NDR)  Cisco Identity Services Engine (ISE)  Darktrace/NETWORK  Divergent Network-Based Asset Discovery  ExtraHop Networks, Inc.  RevealX 360  Forescout Technologies, Inc.  Fortinet FortiNAC  Infoblox  Ivanti Neurons  LevelBlue USM  Lumen Managed Network Based Asset Discovery  NetSkope One  NetWatch.Ai  Palo Alto Networks - NGFW IoT Cloud Delivered Security Service  Solarwinds  Tanium Inc. Core Platform  Tenable Vulnerability Management  Zscaler Zero Trust Network Segmentation  No Preference *How many physical locations (local area networks) will be covered by this capability? *Total number of computer users in organization (include all employment types): *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longe 300 3530 Page 3021 of 3949 Florida Local Government Cybersecurity Grant Application Aide 12 External-Facing Asset Discovery An internet-facing attack surface discovery tool which provides a continuously updated inventory and vulnerability scanning of all global internet-facing assets to detect on-premises and cloud systems. *Are you requesting Internet-Facing Asset Discovery capabilities through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment and if so, are you currently receiving it through the Florida Digital Service?  Yes, through FLDS  Yes, not through FLDS  No If Ye s, has solution: *Percentage of your external-facing assets covered by this solution: *Name of the solution(s) you have deployed: 100 Tenable One Enterprise Page 3022 of 3949 Florida Local Government Cybersecurity Grant Application Aide 13 *Provider and product/service name of your preferred solution. Select one:  Axonius Cybersecurity Asset Management  BlueVoyant Standard Vulnerability Scanning  Check Point - Infinity External Attack Surface Management  CrowdStrike  DarkTrace/Attack Surface Management  Divergent External Facing Asset Discovery  External-Facing Asset Discovery Services and Technology  ExtraHop RevealX 360  Fortinet FortiRECON  Google Mandiant Advantage Attack Surface Management  Invicti Enterprise  Ivanti Neurons for External Attack Surface Mgmt  Lumen Managed External Attack Surface Management  NetWatch.Ai  Palo Alto Networks - Cortex Xpanse  Recorded Future  Shodan Corporate  Tenable.ASM (Attack Surface Management)  Tenable.IO - Vulnerability Management  Trend Micro Vision One Attack Surface Risk Management (ASRM)  Wiz Advanced  No preference *How many external-facing assets are in your environment (publicly advertised IP addresses)? * What are the total assets under management? *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer 100 50 Page 3023 of 3949 Florida Local Government Cybersecurity Grant Application Aide 14 Content Delivery Network Software, including web application firewall, to manage and secure enterprise websites and APIs against DDos and targeted web app attacks while fending off adversarial bots and detecting client-side script attacks. *Are you requesting Content Delivery Network capabilities through this grant opportunity?  Yes  No If Yes Requesting: *Do you have a solution providing this capability deployed in your environment and if so, are you currently receiving it through the Florida Digital Service?  Yes, through FLDS  Yes, not through FLDS  No If Yes; has Solution: *Percentage of your hostnames covered by this solution: *Name of the solution(s) you have deployed: *Provider and product/service name of your preferred solution. Select one:  Akamai Technologies  Cloudflare CDN  F5 Distributed Cloud (XC)  Fortinet FortiADC  Fortinet FortiWEB Cloud  No preference *Number of endpoints (Windows, Linux, MacOS) within your organization: *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer Sophos, Fastly 100% 100 Page 3024 of 3949 Florida Local Government Cybersecurity Grant Application Aide 14 Endpoint Detection & Response (EDR) An agent deployed to each endpoint (including desktops, laptops, and servers), runs autonomously on each device and monitors all processes in real-time to provide enterprise visibility, analytics, malware defense, and automated response. *Are you requesting Endpoint Protection & Response (EDR) capabilities through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment and if so, are you currently receiving it through the Florida Digital Service?  Yes, through FLDS  Yes, not through FLDS  No If Yes, has solution: *Percentage of your assets (Windows, Linux, MacOS) protected by this solution: *Name of the solution(s) you have deployed (if yes): 100% CrowdStrike Falcon Complete Page 3025 of 3949 Florida Local Government Cybersecurity Grant Application Aide 15 *Provider and product/service name of your preferred solution for this year’s grant (if you have a preference). Select one:  Barracuda XDR Managed Endpoint Security  BlueAlly Managed XDR  BlueVoyant XDR Bundle (MDR+SIEM)  Broadcom - Symantec Endpoint Security (SES)  Carbon Black EDR by Broadcom  Check Point Harmony Endpoint  Cisco Secure Endpoint  CrowdStrike Falcon Complete for Endpoint Detection and Response  CyberArk Endpoint Privilege Manager (EPM)  Cylance Endpoint Security  Darktrace/ENDPOINT  Dell MDR  Elastic  Fortinet FortiEDR  Halcyon Tech  Heimdal Unified Endpoint Detection & Response Solution  HighWire EDR Managed Service  Managed Endpoint Detection and Response (MEDR) - Qualys Multi Vector  Microsoft, Azure, MS Defender/SentinelOne  MixMode Endpoint Detection and Response  N-able Endpoint Detection and Response (EDR)  Palo Alto Networks - Cortex XDR  Proofpoint - Identity Threat Detection and Response  Secureworks, inc. (Secureworks) – XDR  SentinelOne - Singularity Complete, Vulnerability Management, and Vigilance  Sophos - Intercept X Advanced with XDR  Tanium Inc. Core Platform  ThreatSpike, Trellix TRX/MV6  Trend Micro Vision One Endpoint Security  No preference Page 3026 of 3949 Florida Local Government Cybersecurity Grant Application Aide 16 *How many devices in your environment (Windows, Linux, MacOS) will be protected by this capability? *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer Email Security Protects your email accounts from threats such as phishing attacks and malware. *Are you requesting Email Security capabilities through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment and if so, are you currently receiving it through the Florida Digital Service?  Yes, through FLDS  Yes, not through FLDS  No If Yes, has solution: *As a percentage, how complete is your implementation of this solution? *Name of the solution(s) you have deployed: 3530 100% Cisco Secure Email Page 3027 of 3949 Florida Local Government Cybersecurity Grant Application Aide 17 *Provider and product/service name of your preferred solution for this year’s grant: Select one:  Abnormal Security  Barracuda Email Protection  BlueVoyant Microsoft Content Delivery  Check Point - Harmony Email and Collaboration (HEC)  Cisco Secure Email  Cloudflare Email Security  Darktrace/EMAIL  Forcepoint Email Security  Fortinet - FortiMail and FortiSandbox  Heimdal Advanced Email Security Solution  IRONSCALES  Lumen Managed Email Security  Microsoft Defender for Office 365  Mimecast Email Security - Cloud Gateway  Omnissa Workspace ONE  OpenText  Proofpoint - Email Security Protection (Proofpoint on Demand)  Proofpoint - Tessian Adapative Email Security  Sophos Email Advance  Trellix ETP/Email Security  Trend Micro Vision One Email & Collaboration Security  XQ Msg  No preference *Total number of named email accounts within organization (exclude shared mailboxes): *Total number of computer users in organization (include all employment types): *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer 2800 Page 3028 of 3949 Florida Local Government Cybersecurity Grant Application Aide 18 Security Operations Platform Providing 24/7/365 monitoring and initial incident investigations to augment your security team. *Are you requesting Security Operations Platform capabilities through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment and if so, are you currently receiving it through the Florida Digital Service?  Yes, through FLDS  Yes, not through FLDS  No If Yes, has solution: *As a percentage, how complete is your implementation of this solution? *Name of the solution(s) you have deployed : *Provider and product/service name of your preferred solution for this year’s grant. Select one:  Arctic Wolf Managed Detection and Response  Avertium (MXDR Services for Existing Microsoft users)  Barracuda XDR  BlueAlly Managed Security Operations Platform  BlueVoyant XDR Bundle (MDR + SIEM)  Check Point Infinity MDR  Cisco XDR  Cloudflare Dashboard  Critical Start - Cyber Operations Risk and Response Platform  Crowdstrike Falcon for Security Operations Platform  Darktrace  Dell MDR  Dynatrace  Elastic  ExtraHop Networks RevealX 100% CrowdStrike Falcon Complete Page 3029 of 3949 Florida Local Government Cybersecurity Grant Application Aide 19  Forescout Technologies, Inc.  Fortinet FortiAnalyzer, FortiSIEM, FortiSOC  Google Mandiant  Google Security Operations (SecOps)  Heimdal Security Operations Platform Solution  HighWire Networks SOC Managed Service  Hosted FortiSIEM  Infoblox, Legato Security (Legato) - Security Operations Center as a Services (SOCaaS),  LevelBlue USM  Presidio Managed Detection and Response  MixMode Security Operations Platform (SOP)  NetWatch.Ai  Palo Alto Networks - Cortex XSIAM  Proofpoint Identity Threat Detection and Response  ReliaQuest GreyMatter  RSM Defense  Secureworks, inc. (Secureworks) - Taegis XDR  Semperis Directory Services Protector & Active Directory Forest Recovery  Snowflake - Security Operations Platform  Sophos MDR  Splunk - Security Operations Platform  Tanium - Secuirty Operations Platform  Tenable.ONE  ThreatBoard - Security Operations Platform (SOP) SaaS  Trellix XDR/Helix  Trend Micro Vision One  No preference *Total number of staff members in organization (include all employment types): *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer 2500 Page 3030 of 3949 Florida Local Government Cybersecurity Grant Application Aide 20 Identity Access Management (IAM) Products or services responsible for providing centralized management for digital identities and control access to systems and data based on organizational policies. *Are you requesting Identity Access Management (IAM) capabilities through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment?  Yes  No If Yes, has solution: *Name of the solution(s) you have deployed: MS Entra Page 3031 of 3949 Florida Local Government Cybersecurity Grant Application Aide 21 *Provider and product/service name of your preferred solution for this year’s grant (if you have a preference). Select one:  Akamai Technologies  Avertium : IAM services for existing Microsoft Users  Beyond Identity  Cisco Identity Services Engine  Crowdstrike Identity Threat Detection and Response  CyberArk Identity  Fortinet FortiAUTHENTICATOR  IBM, Inc. Verify  Microsoft Entra ID  Okta Identity and Access Management (IAM) and Privileged Access Management (PAM) - Workforce Identity Cloud  Omnissa Workspace ONE  One Identity Safeguard and OneLogin  Proofpoint Identity Threat Detection and Response  RSA  SailPoint Identity Security  Stellar IT Solutions: SAML, OpenID, Oracle  No preference *How many devices in your environment (Windows, Linux, MacOS) will be protected by this capability? * How many users will be protected by this solution? *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer 3530 200 Page 3032 of 3949 Florida Local Government Cybersecurity Grant Application Aide 22 Secure Access Service Edge (SASE) Products or services responsible for combining networking and security services, and delivering both through a cloud-based framework that supports remote users, branch offices, and cloud applications. *Are you requesting Secure Access Service Edge (SASE) through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment?  Yes  no If Yes, has solution: *Name of the solution(s) you have deployed: Zscaler Zero Trust Page 3033 of 3949 Florida Local Government Cybersecurity Grant Application Aide 23 *Provider and product/service name of your preferred solution for this year’s grant (if you have a preference).Select one:  Akamai Technologies  Barracuda SecureEdge  Broadcom - Symantec Secure Access Service Edge  Check Point Harmony Connect (SASE)  Cisco Secure Access  Cloudflare One  Dell Services: Zscaler with Zero Trust Services – Security, Software, Design and Configuration  Forcepoint  Fortinet FortiGate, FortiSASE, FortiClient  HighWire Networks SASE Managed Service  Island Enterprise Browser, Island Technologies  Lumen Managed SASE (Fortinet)  Lumen Managed SASE (Versa)  Microsoft Secure Access Service Edge (SASE)  Netskope One  Palo Alto Networks Prisma Access  Skyhigh Security Service Edge  Versa Networks SDWAN and Verson Networks SSE  Zscaler Zero Trust Exchange  No Preference *How many devices in your environment (Windows, Linux, MacOS) will be protected by this capability? * How many users will be protected by this solution? *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer 2500 2500 Page 3034 of 3949 Florida Local Government Cybersecurity Grant Application Aide 24 Vulnerability Assessment and Management (VAM) Products or services responsible for enabling organizations to continuously scan their IT assets for security vulnerabilities, to evaluate the risks associated with these vulnerabilities, and to prioritize remediation efforts. *Are you requesting Vulnerability Assessment and Management through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment?  Yes  No If Yes, has solution: *Name of the solution(s) you have deployed: *Provider and product/service name of your preferred solution for this year’s grant (if you have a preference). Select one:  Armis VIPR Pro  Axonius Cybersecurity Asset Management  BlueAlly Managed Vulnerability Assessment and Management  Check Point Infinity Vulnerability Management  Cortex XSIAM  Critical Strike Vulnerability Management Services  CrowdStrike Falcon Spotlight  Dell MDR Vulnerability Management  Directory Services Protector & Active Directory Forest Recovery  Divergent Vulnerability Assessment and Management  Dynatrace  Forescout Technologies, Inc.  Foresite Managed Autonomous Testing  FortifyData Enterprise Tenable One Enterprise Page 3035 of 3949 Florida Local Government Cybersecurity Grant Application Aide 25  Fortinet FortiScanner Cloud, FortiClient EMS  Heimdal Advanced Vulnerability Management Solution  HighWire Networks Vulnerability Management Managed Service  IBM - Gaurdium Vulnerability Assessment  InsightVM  Invicti Enterprise  Ivanti Neurons for Patch Management  Nessus  Omnissa Workspace One  Palo Alto Networks Cortex XSIAM  Rapid7 InsightVM  Recorded Future  Ret Hat, Inc. Insights  SecPod Technologies, SanerNow  Secureworks, Inc. (Secureworks) – VDR  Semperis Directory Services Protector & Active Directory Forest Recovery  Tanium Vulnerability Assessment and Management  Tenable Vulnerability Management  ThreatBoard - Vulnerability Assessment and Management (VAM) Saas  Trend Micro Vision One Attack Surface Risk Management (ASRM)  Vulnerability Assessment and Management  Wiz Advanced  Zscaler Unified Vulnerability Management  No preference *How many devices in your environment (Windows, Linux, MacOS) will be protected by this capability? * How many endpoints (Windows, Linux, MacOS) will be protected by this solution? *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer 5000 3500 Page 3036 of 3949 Florida Local Government Cybersecurity Grant Application Aide 26 Data Security Products or services responsible for protecting sensitive information from unauthorized access, loss, or exfiltration. *Are you requesting Data Security through this grant opportunity?  Yes  No If Yes, requesting: *Do you have a solution providing this capability deployed in your environment  Yes  No If Yes, has solution: *Name of the solution(s) you have deployed: Page 3037 of 3949 Florida Local Government Cybersecurity Grant Application Aide 27 *Provider and product/service name of your preferred solution for this year’s grant (if you have a preference). Select one:  Antivirus for Amazon S3 (AVS3)  Assured Rubrik Data Security Solution  BigID for Data Security, Compliance, Privacy, and AI  Broadcom - Symantec DLP  Cisco User Protection Suite  Cohesity  Commvault Cloud, Powered by Metallic AI  Cribl Edge, Lake, Stream and Search  CrowdStrike Data Protection  Data Loss Prevention, Data Security Posture Management, ForcepointOne SSE  Fortinet FortiDLP  IBM Guardium  Island Enterprise Browser, Island Technologies  Stellar IT Solutions: Microsoft Purview Informatica  NetSkope One  NVISIONx  OpenText  Palo Alto Networks Prisma SASE / Strata Data Loss Prevention / Cortex  Privacera  Proofpoint Adaptive Email DLP  Proofpoint Information Protection  Rubrik Security Cloud and Data Security Posture Management  Snowflake  Trellix DLP  Varonis Data Security Platform  Wiz Advanced  Zscaler Data Protection  No preference *How many endpoints in your environment (Windows, Linux, MacOS) will be protected by this capability? * How many users will be protected by this solution? 3500 2500 Page 3038 of 3949 Florida Local Government Cybersecurity Grant Application Aide 28 *When is the soonest your organization will be ready to start implementing this capability from date of award? Select one:  Currently implemented  Less than 30 days  31-60 days  61-90 days  91-120 days  Longer Page 3039 of 3949 Florida Local Government Cybersecurity Grant Application Aide 29 Additional Cybersecurity Capability Needs Please tell us about other capabilities/ solutions that you would like to see offered, the provider, and product/service name of your preferred solution (if you have a preference). Page 3040 of 3949 Florida Local Government Cybersecurity Grant Application Aide 30 Grant Matching *If awarded through the Florida Local Cybersecurity Grant Program, do you plan to seek funding outside of the grant program (whether through your organization’s budget or seeking other funding opportunities) to continue awarded solutions?  Yes  No If Yes: *When would you anticipate assuming the fiscal responsibility? (CY2025/CY2026): *What percentage of awarded value would you anticipate assuming that year? (10-100): 60% Page 3041 of 3949 Florida Local Government Cybersecurity Grant Application Aide 31 Additional Information If you have additional information to share regarding your application, including justification, ability to provide matching funds/continued funding, explanation of needs, information on critical infrastructure, environmental factors, state resiliency or any other relevant information, please provide below or upload the information in the attachments section labeled as Additional Information. Page 3042 of 3949 Florida Local Government Cybersecurity Grant Application Aide 32 kenneth.kovensky@colliercountyfl.gov Page 3043 of 3949 From:William Bouza To:Parker Smith Cc:Mark Gillis Subject:FW: Open Now: Cyber Grants Application Window Date:Friday, July 25, 2025 9:20:49 AM Attachments:CountyLogo-FullColor_948165c4-9665-41b4-9162-fbb16abff557.png Facebook_0522f546-5e75-4698-95f9-f15590a3defe.png Instagram_a8da4774-4b5b-4ad1-8d23-20e69b3b605d.png X-Twitter_8d678efc-bd14-44ce-97cf-7fbab1003b00.png Youtube_0078f7f1-7789-4afd-a015-50689fe1f99b.png 311IconforSignature_87c558eb-83f5-449b-87c1-3cc5ac8b0859.png Is this what you are looking for? William Bouza Manager - Cyber Security Information Technology Office:239-252-8280 Mobile:239-786-6005 3299 Tamiami Trail Suite 600 Naples, FL 34112 William.Bouza@colliercountyfl.gov From: Cyber Grants - Florida Digital Service <cybersecuritygrants@digital.fl.gov> Sent: Friday, July 11, 2025 4:03 PM To: William Bouza <William.Bouza@colliercountyfl.gov> Subject: Open Now: Cyber Grants Application Window EXTERNAL EMAIL: This email is from an external source. Confirm this is a trusted sender and use extreme caution when opening attachments or clicking links. Cisco Safe Unsubscribe It appears that you have subscribed to commercial messages from this sender. To stop receiving such messages from this sender, you can unsubscribe. Click here to unsubscribe. ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌   ͏ ‌  ‌ ‌ ‌ Open Now: Cyber Grants Applications Email not loading correctly? Click Here Page 3044 of 3949 Good afternoon, The Department of Management Services and the Florida Digital Service are pleased to announce the opening of the Local Government Cybersecurity Grant Program application window for State Fiscal Year 2025-2026. This $15 million grant opportunity is designed to enhance cybersecurity resilience in local governments, with priority focus on small and fiscally constrained communities and those within rural areas of opportunity. Key details: Application period: July 11 through August 31, 2025 Anticipated award notifications: Fall 2025 No local match is required. The Florida Digital Service will procure solutions on behalf of awarded entities. The program is not intended to subsidize payments for existing cybersecurity solutions. How to apply: Click here to go to cybergrants.fl.gov, learn about the program, and submit your application. We will be hosting informational webinars throughout the application period to walk through the program details and answer any questions you may have. Stay tuned for scheduling announcements. If you have questions in the meantime, please don’t hesitate to reach out at cybersecuritygrants@digital.fl.gov. View email in browser Florida Digital Service · 2555 Shumard Oak Blvd · Tallahassee, FL 32399-7018 · USA update your preferences or unsubscribe Page 3045 of 3949 Under Florida Law, e-mail addresses are public records. If you do not want your e-mail address released in response to a public records request, do not send electronic mail to this entity. Instead, contact this office by telephone or in writing. Page 3046 of 3949