[Congressional Bills 119th Congress] [From the U.S. Government Publishing Office] [H.R. 5078 Introduced in House (IH)] <DOC> 119th CONGRESS 1st Session H. R. 5078 To amend the Homeland Security Act of 2002 to reauthorize the State and local cybersecurity grant program of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes. _______________________________________________________________________ IN THE HOUSE OF REPRESENTATIVES September 2, 2025 Mr. Ogles (for himself, Mr. Garbarino, Mr. Swalwell, and Mr. Evans of Colorado) introduced the following bill; which was referred to the Committee on Homeland Security _______________________________________________________________________ A BILL To amend the Homeland Security Act of 2002 to reauthorize the State and local cybersecurity grant program of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ``Protecting Information by Local Leaders for Agency Resilience Act'' or the ``PILLAR Act''. SEC. 2. REAUTHORIZATION OF CISA STATE AND LOCAL CYBERSECURITY GRANT PROGRAM. Section 2220A of the Homeland Security Act of 2002 (6 U.S.C. 665g) is amended-- (1) in subsection (a)-- (A) by redesignating paragraphs (1), (2), (3), (4), (5), (6), and (7) as paragraphs (3), (4), (6), (8), (9), (10), and (11), respectively; (B) by inserting before paragraph (3), as so redesignated, the following new paragraphs: ``(1) Artificial intelligence.--The term `artificial intelligence' has the meaning given such term in section 5002(3) of the National Artificial Intelligence Initiative Act of 2020 (enacted as division E of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (15 U.S.C. 9401(3))). ``(2) Artificial intelligence system.--The term `artificial intelligence system' means any data system, software, hardware, application tool, or utility that operates in whole or in part using artificial intelligence.''; (C) by inserting after paragraph (4), as so redesignated, the following new paragraph: ``(5) Foreign entity of concern.--The term `foreign entity of concern' has the meaning given such term in section 10634 of the Research and Development, Competition, and Innovation Act (42 U.S.C. 19237; Public Law 117-167; popularly referred to as the `CHIPS and Science Act').''; and (D) by inserting after paragraph (6), as so redesignated, the following new paragraph: ``(7) Multi-factor authentication.--The term `multi factor authentication' means an authentication system that requires more than one distinct type of authentication factor for successful authentication of a user, including by using a multi-factor authenticator or by combining single-factor authenticators that provide different types of factors.''; (2) in subsection (b)(1), by striking ``information systems owned'' and inserting ``information systems or operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned, or''; (3) in subsection (d)(4), by striking ``to the information systems owned'' and inserting ``to the information systems or operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned, or''; (4) in subsection (e)-- (A) in paragraph (2)-- (i) in subparagraph (A)(i), by striking ``information systems owned'' and inserting ``information systems or operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned, or''; (ii) in subparagraph (B)-- (I) by amending clauses (i) through (v) to read as follows: ``(i) manage, monitor, and track applications, user accounts, and information systems and operational technology systems, including either or both of such systems using artificial intelligence, that are maintained, owned, or operated by, or on behalf of, the eligible entity, or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, and the information technology deployed on such information systems or operational technology systems (as the case may be), including legacy information systems, operational technology systems, and information technology that are no longer supported by the manufacturer of the systems or technology at issue; ``(ii) monitor, audit, and track network traffic and activity transiting or traveling to or from applications, user accounts, and information systems and operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned, or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; ``(iii) enhance the preparation, response, and resiliency of applications, user accounts, and information systems and operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned, or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, against cybersecurity risks and cybersecurity threats; ``(iv) implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats on applications, user accounts, and information systems and operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned, or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; ``(v) ensure that the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, adopt and use best practices and methodologies to enhance cybersecurity, particularly identity and access management solutions such as multi-factor authentication, which may include-- ``(I) the practices set forth in a cybersecurity framework developed by the National Institute of Standards and Technology or the Agency; ``(II) cyber chain supply chain risk management best practices identified by the National Institute of Standards and Technology or the Agency; ``(III) knowledge bases of adversary tools and tactics; ``(IV) technologies such as artificial intelligence; and ``(V) improving cyber incident response capabilities through adoption of automated cybersecurity practices;''; (II) in clause (x), by inserting ``or operational technology systems, including either or both of such systems using artificial intelligence,'' after ``information systems''; (III) in clause (xi)(I), by inserting ``, including through Department of Homeland Security State, Local, and Regional Fusion Center Initiative under section 210(A)'' before the semicolon; (IV) in clause (xii), by inserting ``, including for bolstering the resilience of outdated or vulnerable information systems or operational technology systems, including either or both of such systems using artificial intelligence'' before the semicolon; (V) by amending clause (xiii) to read as follows: ``(xiii) implement an information technology or operational technology, including either or both of such systems using artificial intelligence, modernization cybersecurity review process that ensures alignment between information technology, operational technology, and artificial intelligence cybersecurity objectives;''; (VI) in clause (xiv)(II)-- (aa) in item (aa), by striking ``and'' after the semicolon; (bb) in item (bb), by inserting ``and'' after the semicolon; and (cc) by adding at the end the following new item: ``(cc) academic and nonprofit entities, including cybersecurity clinics and other nonprofit technical assistance programs;''; and (VII) by amending clause (xv) to read as follows: ``(xv) ensure adequate access to, and participation in, the services and programs described in this subparagraph by rural areas and other local governments with small populations within the jurisdiction of the eligible entity, including by direct outreach to such rural areas and local governments with small populations; and''; and (iii) in subparagraph (F)-- (I) in clause (i), by striking ``and'' after the semicolon; (II) by amending clause (ii) to read as follows: ``(ii) reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems or operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity; and''; and (III) by adding at the end the following new clause: ``(iii) assuming the cost or partial cost of cybersecurity investments made as a result of the plan.''; and (B) in paragraph (3)(A), by striking ``the Multi- State Information Sharing and Analysis Center'' and inserting ``Information Sharing and Analysis Organizations''; (5) in subsection (g)-- (A) in paragraph (2)(A)(ii), by inserting ``including, as appropriate, representatives of rural, suburban, and high-population jurisdictions (including such jurisdictions with low or otherwise limited operating budgets)'' before the semicolon; and (B) by amending paragraph (5) to read as follows: ``(5) Rule of construction regarding control of certain information systems or operational technology systems of eligible entities.--Nothing in this subsection may be construed to permit a cybersecurity planning committee of an eligible entity that meets the requirements of this subsection to make decisions relating to information systems or operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned, or operated by, or on behalf of, the eligible entity.''; (6) in subsection (i)-- (A) in paragraph (1)(B), by striking ``2-year period'' and inserting ``3-year period''; (B) in paragraph (3)-- (i) in the matter preceding subparagraph (A), by striking ``2023'' and inserting ``2027''; and (ii) in subparagraph (B), by striking ``2023'' and inserting ``2027''; and (C) in paragraph (4)-- (i) in the matter preceding subparagraph (A), by striking ``shall'' and inserting ``may''; and (ii) in subparagraph (A), by striking ``information systems owned'' inserting ``information systems or operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned,''; (7) in subsection (j)(1)-- (A) in subparagraph (D), by striking ``or'' after the semicolon; (B) in subparagraph (E)-- (i) by striking ``information systems owned'' and inserting ``information systems or operational technology systems, including either or both of such systems using artificial intelligence, maintained, owned,''; and (ii) by striking the period and inserting a semicolon; and (C) by adding at the end the following new subparagraphs: ``(E) to purchase software or hardware, or products or services of such software or hardware, as the case may be, that do not align with guidance relevant to such software or hardware, or products or services, as the case may be, provided by the Agency, including Secure by Design or successor guidance; or ``(F) to purchase software or hardware, or products or services of such software or hardware, as the case may be, that are designed, developed, operated, maintained, manufactured, or sold by a foreign entity of concern and do not align with guidance provided by the Agency.''; (8) in subsection (l), in the matter preceding paragraph (1), by striking ``2022'' and inserting ``2026''; (9) in subsection (m), by amending paragraph (1) to read as follows: ``(1) In general.--The Federal share of activities carried out using funds made available pursuant to the award of a grant under this section may not exceed-- ``(A) in the case of a grant to an eligible entity, 60 percent for each fiscal year through fiscal year 2035; and ``(B) in the case of a grant to a multi-entity group, 70 percent for each fiscal year through fiscal year 2035. Notwithstanding subparagraphs (A) and (B), the Federal share of the cost for an eligible entity or multi-entity group shall be 65 percent for an entity and 75 percent for a multi-group entity for each fiscal year beginning with fiscal year 2028 through fiscal year 2035 if such entity or multi-entity group entity, as the case may be, implements or enables, by not later than October 1, 2027, multi-factor authentication and identity and access management tools that support multi-factor authentication with respect to critical infrastructure, including the information systems and operational technology systems, including either or both of such systems using