Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Senate Committee Advances Controversial Cybersecurity Bill

The Senate Intelligence Committee passed the controversial Cybersecurity Information Sharing Act, or CISA, by a vote of 14 to 1 on Thursday afternoon.

The Senate Intelligence Committee passed the controversial Cybersecurity Information Sharing Act, or CISA, by a vote of 14 to 1 on Thursday afternoon.

Co-sponsored by Intelligence Committee Chairman Richard Burr (R-N.C.) and Vice Chairman Dianne Feinstein (D-Calif.), the legislation is designed to make it easier for businesses and governments to share threat and attack information to defend against cyber-attacks, but privacy groups oppose the bill over its potential to give the government access to a huge trove of personal data about Americans. 

“The bill approved today by the Intelligence Committee on a strong bipartisan vote is a critical step to confront one of the most dire national and economic threats we face: cyber attacks,” Feinstein said in a statement. “In just the last year, hundreds of millions of Americans have had their data compromised, a number of major American companies have been attacked, intellectual property has been stolen, and there have even been attempts to hack our critical infrastructure.”

Senate

“This bill would help defend against cyber attacks by allowing purely voluntary information sharing—limited to specific information about cyber threats—to better help the private sector and government understand and respond to these threats,” Feinstein continued. “The robust privacy requirements and liability protection make this a balanced bill, and I hope the Senate acts on it quickly.”

As the only member of the committee to vote against the bill, Senator Ron Wyden (D-Ore.) said the bill lacks privacy protections, and doesn’t secure networks.

“It makes sense to encourage private firms to share information about cybersecurity threats,” Wyden said in a statement. “But this information sharing is only acceptable if there are strong protections for the privacy rights of law-abiding American citizens.”

According to Feinstein, The Cybersecurity Information Sharing Act of 2015:

• Directs increased sharing of classified and unclassified information about cyber threats with the private sector, including declassification of intelligence as appropriate.

Advertisement. Scroll to continue reading.

• Authorizes private entities to monitor their networks or those of their consenting customers for cybersecurity purposes. Companies are authorized to share cyber threat indicators or defensive measures with each other or the government.

• Requires the establishment of a capability (sometimes referred to as a “portal”) at the Department of Homeland Security (DHS) as the primary government capability to quickly accept cyber threat indicators and defensive measures through electronic means.

• Provides liability protection for companies’ appropriate use of additional cybersecurity authorities. The monitoring of networks for cybersecurity threats is protected from liability, along with sharing information about cyber threats between companies consistent with the bill’s requirements.

• Requires reports on implementation and privacy impacts by agency heads, Inspectors General, and the Privacy Civil Liberties Oversight Board to ensure that cyber threat information is properly received, handled, and shared by the government.

Privacy protections include:

• Does not require any private sector entity to share cyber threat information. Sharing is strictly voluntary.

• Narrowly defines the term “cyber threat indicator” to limit the amount of information that may be shared under the Act.

• Limits the use of cyber threat indicators to specific purposes, including the prevention of cybersecurity threats and serious crimes.

• Requires the removal of personal information prior to the sharing of cyber threat indicators.

“This bipartisan legislation is critical to securing our nation against escalating cyber threats,” said Burr. “I’m pleased CISA will advance to the Senate floor where it will enjoy support from both sides of the aisle. The bill we passed today is overdue and will enable our agencies and institutions to share information about cyber threats while also providing strong privacy protection for our citizens. With risks are growing every day, we are finally better prepared to combat cyber attackers with this bill.”

Wyden disagrees, making his case that the bill lacks appropriate measures to protect citizens’ privacy.

“If information-sharing legislation does not include adequate privacy protections then that’s not a cybersecurity bill – it’s a surveillance bill by another name,” Wyden added. “I am concerned that the bill the U.S. Senate Select Committee on Intelligence reported today lacks adequate protections for the privacy rights of American consumers, and that it will have a limited impact on U.S. cybersecurity.”

“The most effective way to protect cybersecurity is by ensuring network owners take responsibility for security,” Wyden continued. “Strong cybersecurity legislation should make clear that government agencies cannot order U.S. hardware and software companies to build weaker products, as senior FBI officials have proposed.”

RelatedUnderstanding The Challenges In Information Sharing

RelatedCyber Attack Exercise Reveals Information Sharing Struggles

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...