County of Sullivan header
File #: ID-7386    Version: 1 Name:
Type: Resolution Status: Agenda Ready
File created: 4/13/2025 In control: Executive Committee
On agenda: 4/24/2025 Final action:
Enactment date: Enactment #:
Title: To enter into a shared services Intergovernmental Agreement with the NYS Divisions of Information Technology Services and Homeland Security and Emergency Services.
Date Ver.Action ByActionResultAction DetailsMeeting DetailsVideo
No records to display.
Narrative of Resolution:
title
To enter into a shared services Intergovernmental Agreement with the NYS Divisions of Information Technology Services and Homeland Security and Emergency Services.
end

body
If Resolution requires expenditure of County Funds, provide the following information:
Amount to be authorized by Resolution: $0
Are funds already budgeted? Choose an item.
Specify Compliance with Procurement Procedures: NYS funded (for 3-years) shared services offering.
RESOLUTION INTRODUCED BY THE EXECUTIVE COMMITTEE TO AUTHORIZE THE COUNTY MANAGER TO ENTER INTO A SHARED SERVICES INTERGOVERNMENTAL AGREEMENT WITH NEW YORK STATE INFORMATION TECHNOLOGY SERVICES AND THE NEW YORK STATE DIVISION OF HOMELAND SECURITY AND EMERGENCY SERVICES

WHEREAS, on July 21, 2022, Governor Hochul announced the launch of a $30 Million shared services program to enhance cyber defenses in Counties across New York State (NYS); and

WHEREAS, this NYS shared services program will be administered by the New York State Office of Information Technology Services (NYS ITS) and the New York State Division of Homeland Security and Emergency Services (DHSES); and

WHEREAS, under this shared services program, New York counties will be offered an Attack Surface Management (ASM) solution at no cost; and

WHEREAS, ASM refers to the sum of all potential entry points that an attacker can exploit to gain unauthorized access to an organization's systems, data, and infrastructure. As we adopt cloud technologies, remote work, and Internet of Things (IoT) devices, the attack surface expands, making monitoring and securing all vulnerabilities increasingly challenging. The potential entry points that an attack surface comprises include:

* Applications: Software accessible externally
* Websites: All agency-hosted websites
* Networks: Any network used to connect devices
* Devices: Any connected device
* Cloud infrastructure: Any cloud services used

Attack...

Click here for full text