[Congressional Bills 119th Congress]
[From the U.S. Government Publishing Office]
[H.R. 5078 Introduced in House (IH)]

<DOC>






119th CONGRESS
  1st Session
                                H. R. 5078

To amend the Homeland Security Act of 2002 to reauthorize the State and 
      local cybersecurity grant program of the Cybersecurity and 
Infrastructure Security Agency of the Department of Homeland Security, 
                        and for other purposes.


_______________________________________________________________________


                    IN THE HOUSE OF REPRESENTATIVES

                           September 2, 2025

 Mr. Ogles (for himself, Mr. Garbarino, Mr. Swalwell, and Mr. Evans of 
  Colorado) introduced the following bill; which was referred to the 
                     Committee on Homeland Security

_______________________________________________________________________

                                 A BILL


 
To amend the Homeland Security Act of 2002 to reauthorize the State and 
      local cybersecurity grant program of the Cybersecurity and 
Infrastructure Security Agency of the Department of Homeland Security, 
                        and for other purposes.

    Be it enacted by the Senate and House of Representatives of the 
United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

    This Act may be cited as the ``Protecting Information by Local 
Leaders for Agency Resilience Act'' or the ``PILLAR Act''.

SEC. 2. REAUTHORIZATION OF CISA STATE AND LOCAL CYBERSECURITY GRANT 
              PROGRAM.

    Section 2220A of the Homeland Security Act of 2002 (6 U.S.C. 665g) 
is amended--
            (1) in subsection (a)--
                    (A) by redesignating paragraphs (1), (2), (3), (4), 
                (5), (6), and (7) as paragraphs (3), (4), (6), (8), 
                (9), (10), and (11), respectively;
                    (B) by inserting before paragraph (3), as so 
                redesignated, the following new paragraphs:
            ``(1) Artificial intelligence.--The term `artificial 
        intelligence' has the meaning given such term in section 
        5002(3) of the National Artificial Intelligence Initiative Act 
        of 2020 (enacted as division E of the William M. (Mac) 
        Thornberry National Defense Authorization Act for Fiscal Year 
        2021 (15 U.S.C. 9401(3))).
            ``(2) Artificial intelligence system.--The term `artificial 
        intelligence system' means any data system, software, hardware, 
        application tool, or utility that operates in whole or in part 
        using artificial intelligence.'';
                    (C) by inserting after paragraph (4), as so 
                redesignated, the following new paragraph:
            ``(5) Foreign entity of concern.--The term `foreign entity 
        of concern' has the meaning given such term in section 10634 of 
        the Research and Development, Competition, and Innovation Act 
        (42 U.S.C. 19237; Public Law 117-167; popularly referred to as 
        the `CHIPS and Science Act').''; and
                    (D) by inserting after paragraph (6), as so 
                redesignated, the following new paragraph:
            ``(7) Multi-factor authentication.--The term `multi factor 
        authentication' means an authentication system that requires 
        more than one distinct type of authentication factor for 
        successful authentication of a user, including by using a 
        multi-factor authenticator or by combining single-factor 
        authenticators that provide different types of factors.'';
            (2) in subsection (b)(1), by striking ``information systems 
        owned'' and inserting ``information systems or operational 
        technology systems, including either or both of such systems 
        using artificial intelligence, maintained, owned, or'';
            (3) in subsection (d)(4), by striking ``to the information 
        systems owned'' and inserting ``to the information systems or 
        operational technology systems, including either or both of 
        such systems using artificial intelligence, maintained, owned, 
        or'';
            (4) in subsection (e)--
                    (A) in paragraph (2)--
                            (i) in subparagraph (A)(i), by striking 
                        ``information systems owned'' and inserting 
                        ``information systems or operational technology 
                        systems, including either or both of such 
                        systems using artificial intelligence, 
                        maintained, owned, or'';
                            (ii) in subparagraph (B)--
                                    (I) by amending clauses (i) through 
                                (v) to read as follows:
                            ``(i) manage, monitor, and track 
                        applications, user accounts, and information 
                        systems and operational technology systems, 
                        including either or both of such systems using 
                        artificial intelligence, that are maintained, 
                        owned, or operated by, or on behalf of, the 
                        eligible entity, or, if the eligible entity is 
                        a State, local governments within the 
                        jurisdiction of the eligible entity, and the 
                        information technology deployed on such 
                        information systems or operational technology 
                        systems (as the case may be), including legacy 
                        information systems, operational technology 
                        systems, and information technology that are no 
                        longer supported by the manufacturer of the 
                        systems or technology at issue;
                            ``(ii) monitor, audit, and track network 
                        traffic and activity transiting or traveling to 
                        or from applications, user accounts, and 
                        information systems and operational technology 
                        systems, including either or both of such 
                        systems using artificial intelligence, 
                        maintained, owned, or operated by, or on behalf 
                        of, the eligible entity or, if the eligible 
                        entity is a State, local governments within the 
                        jurisdiction of the eligible entity;
                            ``(iii) enhance the preparation, response, 
                        and resiliency of applications, user accounts, 
                        and information systems and operational 
                        technology systems, including either or both of 
                        such systems using artificial intelligence, 
                        maintained, owned, or operated by, or on behalf 
                        of, the eligible entity or, if the eligible 
                        entity is a State, local governments within the 
                        jurisdiction of the eligible entity, against 
                        cybersecurity risks and cybersecurity threats;
                            ``(iv) implement a process of continuous 
                        cybersecurity vulnerability assessments and 
                        threat mitigation practices prioritized by 
                        degree of risk to address cybersecurity risks 
                        and cybersecurity threats on applications, user 
                        accounts, and information systems and 
                        operational technology systems, including 
                        either or both of such systems using artificial 
                        intelligence, maintained, owned, or operated 
                        by, or on behalf of, the eligible entity or, if 
                        the eligible entity is a State, local 
                        governments within the jurisdiction of the 
                        eligible entity;
                            ``(v) ensure that the eligible entity and, 
                        if the eligible entity is a State, local 
                        governments within the jurisdiction of the 
                        eligible entity, adopt and use best practices 
                        and methodologies to enhance cybersecurity, 
                        particularly identity and access management 
                        solutions such as multi-factor authentication, 
                        which may include--
                                    ``(I) the practices set forth in a 
                                cybersecurity framework developed by 
                                the National Institute of Standards and 
                                Technology or the Agency;
                                    ``(II) cyber chain supply chain 
                                risk management best practices 
                                identified by the National Institute of 
                                Standards and Technology or the Agency;
                                    ``(III) knowledge bases of 
                                adversary tools and tactics;
                                    ``(IV) technologies such as 
                                artificial intelligence; and
                                    ``(V) improving cyber incident 
                                response capabilities through adoption 
                                of automated cybersecurity 
                                practices;'';
                                    (II) in clause (x), by inserting 
                                ``or operational technology systems, 
                                including either or both of such 
                                systems using artificial 
                                intelligence,'' after ``information 
                                systems'';
                                    (III) in clause (xi)(I), by 
                                inserting ``, including through 
                                Department of Homeland Security State, 
                                Local, and Regional Fusion Center 
                                Initiative under section 210(A)'' 
                                before the semicolon;
                                    (IV) in clause (xii), by inserting 
                                ``, including for bolstering the 
                                resilience of outdated or vulnerable 
                                information systems or operational 
                                technology systems, including either or 
                                both of such systems using artificial 
                                intelligence'' before the semicolon;
                                    (V) by amending clause (xiii) to 
                                read as follows:
                            ``(xiii) implement an information 
                        technology or operational technology, including 
                        either or both of such systems using artificial 
                        intelligence, modernization cybersecurity 
                        review process that ensures alignment between 
                        information technology, operational technology, 
                        and artificial intelligence cybersecurity 
                        objectives;'';
                                    (VI) in clause (xiv)(II)--
                                            (aa) in item (aa), by 
                                        striking ``and'' after the 
                                        semicolon;
                                            (bb) in item (bb), by 
                                        inserting ``and'' after the 
                                        semicolon; and
                                            (cc) by adding at the end 
                                        the following new item:
                                            ``(cc) academic and 
                                        nonprofit entities, including 
                                        cybersecurity clinics and other 
                                        nonprofit technical assistance 
                                        programs;''; and
                                    (VII) by amending clause (xv) to 
                                read as follows:
                            ``(xv) ensure adequate access to, and 
                        participation in, the services and programs 
                        described in this subparagraph by rural areas 
                        and other local governments with small 
                        populations within the jurisdiction of the 
                        eligible entity, including by direct outreach 
                        to such rural areas and local governments with 
                        small populations; and''; and
                            (iii) in subparagraph (F)--
                                    (I) in clause (i), by striking 
                                ``and'' after the semicolon;
                                    (II) by amending clause (ii) to 
                                read as follows:
                            ``(ii) reducing cybersecurity risks to, and 
                        identifying, responding to, and recovering from 
                        cybersecurity threats to, information systems 
                        or operational technology systems, including 
                        either or both of such systems using artificial 
                        intelligence, maintained, owned or operated by, 
                        or on behalf of, the eligible entity or, if the 
                        eligible entity is a State, local governments 
                        within the jurisdiction of the eligible entity; 
                        and''; and
                                    (III) by adding at the end the 
                                following new clause:
                            ``(iii) assuming the cost or partial cost 
                        of cybersecurity investments made as a result 
                        of the plan.''; and
                    (B) in paragraph (3)(A), by striking ``the Multi-
                State Information Sharing and Analysis Center'' and 
                inserting ``Information Sharing and Analysis 
                Organizations'';
            (5) in subsection (g)--
                    (A) in paragraph (2)(A)(ii), by inserting 
                ``including, as appropriate, representatives of rural, 
                suburban, and high-population jurisdictions (including 
                such jurisdictions with low or otherwise limited 
                operating budgets)'' before the semicolon; and
                    (B) by amending paragraph (5) to read as follows:
            ``(5) Rule of construction regarding control of certain 
        information systems or operational technology systems of 
        eligible entities.--Nothing in this subsection may be construed 
        to permit a cybersecurity planning committee of an eligible 
        entity that meets the requirements of this subsection to make 
        decisions relating to information systems or operational 
        technology systems, including either or both of such systems 
        using artificial intelligence, maintained, owned, or operated 
        by, or on behalf of, the eligible entity.'';
            (6) in subsection (i)--
                    (A) in paragraph (1)(B), by striking ``2-year 
                period'' and inserting ``3-year period'';
                    (B) in paragraph (3)--
                            (i) in the matter preceding subparagraph 
                        (A), by striking ``2023'' and inserting 
                        ``2027''; and
                            (ii) in subparagraph (B), by striking 
                        ``2023'' and inserting ``2027''; and
                    (C) in paragraph (4)--
                            (i) in the matter preceding subparagraph 
                        (A), by striking ``shall'' and inserting 
                        ``may''; and
                            (ii) in subparagraph (A), by striking 
                        ``information systems owned'' inserting 
                        ``information systems or operational technology 
                        systems, including either or both of such 
                        systems using artificial intelligence, 
                        maintained, owned,'';
            (7) in subsection (j)(1)--
                    (A) in subparagraph (D), by striking ``or'' after 
                the semicolon;
                    (B) in subparagraph (E)--
                            (i) by striking ``information systems 
                        owned'' and inserting ``information systems or 
                        operational technology systems, including 
                        either or both of such systems using artificial 
                        intelligence, maintained, owned,''; and
                            (ii) by striking the period and inserting a 
                        semicolon; and
                    (C) by adding at the end the following new 
                subparagraphs:
                    ``(E) to purchase software or hardware, or products 
                or services of such software or hardware, as the case 
                may be, that do not align with guidance relevant to 
                such software or hardware, or products or services, as 
                the case may be, provided by the Agency, including 
                Secure by Design or successor guidance; or
                    ``(F) to purchase software or hardware, or products 
                or services of such software or hardware, as the case 
                may be, that are designed, developed, operated, 
                maintained, manufactured, or sold by a foreign entity 
                of concern and do not align with guidance provided by 
                the Agency.'';
            (8) in subsection (l), in the matter preceding paragraph 
        (1), by striking ``2022'' and inserting ``2026'';
            (9) in subsection (m), by amending paragraph (1) to read as 
        follows:
            ``(1) In general.--The Federal share of activities carried 
        out using funds made available pursuant to the award of a grant 
        under this section may not exceed--
                    ``(A) in the case of a grant to an eligible entity, 
                60 percent for each fiscal year through fiscal year 
                2035; and
                    ``(B) in the case of a grant to a multi-entity 
                group, 70 percent for each fiscal year through fiscal 
                year 2035.
        Notwithstanding subparagraphs (A) and (B), the Federal share of 
        the cost for an eligible entity or multi-entity group shall be 
        65 percent for an entity and 75 percent for a multi-group 
        entity for each fiscal year beginning with fiscal year 2028 
        through fiscal year 2035 if such entity or multi-entity group 
        entity, as the case may be, implements or enables, by not later 
        than October 1, 2027, multi-factor authentication and identity 
        and access management tools that support multi-factor 
        authentication with respect to critical infrastructure, 
        including the information systems and operational technology 
        systems, including either or both of such systems using