• Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Call us! 210-458-2119

CIAS@UTSA.edu
CIAS ISAOCIAS ISAO
  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

UTSA receives $1.2 million CISA grant to develop Pilot Program for SLTTs

Home NewsUTSA receives $1.2 million CISA grant to develop Pilot Program for SLTTs

UTSA receives $1.2 million CISA grant to develop Pilot Program for SLTTs

March 8, 2021 News

The Cybersecurity and Infrastructure Security Agency (CISA) has awarded the Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio (UTSA) a $1.2 million grant to conduct a pilot program to help state, local, tribal and territorial governments identify high value assets (HVA) in order to prioritize resources and planning.

The pilot will aid these governments in establishing an HVA program that aligns with the federal government’s while maintaining the flexibility needed to incorporate their individual needs.       

“CISA is excited to partner with The University of Texas at San Antonio on the State, Local, Tribal and Territorial High Value Asset Program,” said Acting CISA Director Brandon Wales. “As the Nation’s risk advisor, the collaboration with our stakeholders to enhance the protection of our nation’s critical infrastructure is invaluable. In a time of increased cyber threats, the relationships that we build through cooperative agreements to supply cyber capabilities and expertise are foundational to safeguarding the nations cyber and critical infrastructure.”

“Communities nationwide are becoming increasingly targeted by cyber threats – both domestic and foreign,” said Associate Director of Training Programs at the CIAS, Natalie Sjelin. “It’s more important than ever to help jurisdictions identify, categorize and prioritize their high value assets in order to defend assets that are critical to an organization’s ability to perform its mission.”

The two-year pilot program will develop guidance based on best practices to address the identification, categorization and prioritization of IT systems to enable increased protection of HVAs across various jurisdictions. To successfully identify high value assets among different jurisdictions, the CIAS is collaborating with CISA to develop scalable guidelines, templates and tools that can be used to facilitate implementation of identified processes within the context of each community’s risk management framework, available resources and authorities.

The UTSA team was awarded the grant following a competitive selection process. UTSA is a nationally recognized Center of Academic Excellence in Information Assurance and Cyber Defense.

Tags: critical infrastructurehigh value assetsHVASLTT
Share
0

You also might be interested in

Identifying HVAs and MEFs

Have You Identified Your IT High Value Assets?

Nov 11, 2021

In today’s increasingly connected world, it is more important than ever to ensure an organization’s information and information systems are protected from cyber threats. Every organization has critical information and technology assets that are essential and require enhanced security. However, due to finite organizational resources, a deliberate and strategically-focused approach is needed to identify – and secure – the most important assets. Gain a better understand of why formally identifying your high value assets - and mission essential functions - are critical to supporting your organization's ability to conduct business.

Cyber Infrastructure Attacks

Attacks on Critical Infrastructures and Protecting Them

Jul 7, 2021

We know our infrastructures are targets for cyberattacks, both for cyber criminals as well as nation-states. Understanding the types of cyber attacks on critical infrastructure provides lessons on how to defend and protect against such attacks. This article also provides 11 steps that communities can take to prepare for an attack on one or more of their critical infrastructures.

New: The CIAS Community Cybersecurity Clinic Check it out
CIAS ISAO
  • Facebook
  • LinkedIn
  • X
  • Twitter
  • The Crucial Function of Cybersecurity Policies in Organizations
  • A Roadmap to Developing Your Community Cybersecurity Program
  • Collaboration and Consensus: Using the MITRE ATT&CK Framework
  • Introducing Alan CyBear, the Smokey of Cybersecurity
  • Think like a Hacker, a Defense Strategy
  • Engaging your Leadership in Cybersecurity

© 2026 UTSA Center for Infrastructure Assurance & Security -- CIAS-ISAO powered by

  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website
Prev Next