Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Senate Passes DHS Cyber Hunt and Incident Response Teams Act

The United States Senate recently passed the DHS Cyber Hunt and Incident Response Teams Act, a piece of legislation that instructs the DHS to help organizations protect themselves against cyber threats and respond to incidents.

The United States Senate recently passed the DHS Cyber Hunt and Incident Response Teams Act, a piece of legislation that instructs the DHS to help organizations protect themselves against cyber threats and respond to incidents.

First introduced in 2018 by Senators Maggie Hassan (D-NH) and Rob Portman (R-OH) as the DHS Cyber Incident Response Teams Act of 2018 and then reintroduced this year, the bill authorizes the DHS to maintain “cyber hunt” and incident response teams that would assist both government and private entities in their effort to prevent cyberattacks and respond in case there is an incident.

Senator Charles E. Schumer, who co-sponsored the bill, believes it could be highly useful for protecting educational institutions against ransomware and other types of threats.

If the bill is signed into law, organizations could ask the DHS to send its cyber hunt teams to help them strengthen their cyber defenses or, if a successful attack has occurred, send in its incident response teams.

Now that it has passed Senate, the bill will need to get approval from the House of Representatives and then it can be signed into law by the president. However, the DHS Cyber Hunt and Incident Response Teams Act is similar to another bill that has already passed the House of Representatives and the two will have to undergo a reconciliation process.

“Our cyber response teams play an important role in protecting against cyber threats, reducing cybersecurity risks, and helping to get our cyber infrastructure back up and running after an attack occurs,” stated Senator Portman. “I am glad the Senate passed our bipartisan legislation and I hope we send it to the president’s desk soon so that we can strengthen our response efforts in the event of a cyberattack.”

This is not the only cyber-focused legislation proposed by senators Hassan and Portman. They are also behind the Hack DHS Act and Public-Private Cybersecurity Cooperation Act, both of which were signed into law in 2018. The former establishes a bug bounty program whose goal is to encourage vetted researchers to find vulnerabilities in DHS systems, while the latter establishes a vulnerability disclosure program that should make it easy to report and address the security holes identified in DHS systems.

Related: Legislation Would Stiffen Penalties for Ransomware Attacks

Advertisement. Scroll to continue reading.

Related: Bipartisan Legislation to Require DHS Alerts on Election Hacking

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.