, ARE YOU PREPARED FOR fl hb 7055?

The State of Florida has announced new requirements for enhanced cybersecurity posture with the introduction of House Bill 7055. By 2024, many Florida agencies will now be required by the state to:

  • Establish a Cybersecurity Incident Team/Plan & Report it to the State of Florida Government Agency
  • Perform Risk Assessments
  • Provide state and local government employees with cybersecurity training within 30 days of employment and annually thereafter. (HB 7055 prohibits state agencies and local governments from paying or otherwise complying with a ransomware demand)

THANK YOU FOR
COMPLETING THE FORM

One of our representatives will be in contact with you soon.

In the meantime, learn more about the requirements of Florida House Bill 7055.

brochure

Ready to demo the solutions necessary to meet the requirements of FL HB 7055? We're here to help.

black linkedin logo AUTOFILL WITH LINKEDIN

MOTOROLA SOLUTIONS CAN HELP YOU NAVIGATE THIS BILL. HERE'S HOW:

column image
PENETRATION TESTING

Penetration Testing and Technical Assessments include internal, external and wireless penetration testing, mobile and web app assessments, social engineering, phishing and vulnerability assessments.

column image
RISK ASSESSMENT - ANNUALLY

Risk and Gap Assessments evaluate people, processes, and technology to provide a roadmap to help determine the best procedures and controls, including compliance requirements.

column image
MANAGED DETECTION RESPONSE (MDR)

Get 24/7 monitoring, detection, and response from certified cybersecurity experts. Protect cloud applications and infrastructure, endpoint devices, IT networks, and mission-critical systems like ASTRO, VESTA, PremierOne, and Flex CAD with our Managed Detection and Response (MDR) services, powered by our ActiveEye security platform. Public safety and enterprise customers get visibility into all relevant activity and see what our analysts see with our co-managed services, integrated with and built to standards required for mission-critical systems, and as much or as little support as they require from our Security Operations Centers (SOC).

CYBERSECURITY RESOURCE CENTER

Learn more about how we help public safety and enterprise organizations defend against cyber threats