Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Senate Passes DHS Cyber Hunt and Incident Response Teams Act

The United States Senate recently passed the DHS Cyber Hunt and Incident Response Teams Act, a piece of legislation that instructs the DHS to help organizations protect themselves against cyber threats and respond to incidents.

The United States Senate recently passed the DHS Cyber Hunt and Incident Response Teams Act, a piece of legislation that instructs the DHS to help organizations protect themselves against cyber threats and respond to incidents.

First introduced in 2018 by Senators Maggie Hassan (D-NH) and Rob Portman (R-OH) as the DHS Cyber Incident Response Teams Act of 2018 and then reintroduced this year, the bill authorizes the DHS to maintain “cyber hunt” and incident response teams that would assist both government and private entities in their effort to prevent cyberattacks and respond in case there is an incident.

Senator Charles E. Schumer, who co-sponsored the bill, believes it could be highly useful for protecting educational institutions against ransomware and other types of threats.

If the bill is signed into law, organizations could ask the DHS to send its cyber hunt teams to help them strengthen their cyber defenses or, if a successful attack has occurred, send in its incident response teams.

Now that it has passed Senate, the bill will need to get approval from the House of Representatives and then it can be signed into law by the president. However, the DHS Cyber Hunt and Incident Response Teams Act is similar to another bill that has already passed the House of Representatives and the two will have to undergo a reconciliation process.

“Our cyber response teams play an important role in protecting against cyber threats, reducing cybersecurity risks, and helping to get our cyber infrastructure back up and running after an attack occurs,” stated Senator Portman. “I am glad the Senate passed our bipartisan legislation and I hope we send it to the president’s desk soon so that we can strengthen our response efforts in the event of a cyberattack.”

This is not the only cyber-focused legislation proposed by senators Hassan and Portman. They are also behind the Hack DHS Act and Public-Private Cybersecurity Cooperation Act, both of which were signed into law in 2018. The former establishes a bug bounty program whose goal is to encourage vetted researchers to find vulnerabilities in DHS systems, while the latter establishes a vulnerability disclosure program that should make it easy to report and address the security holes identified in DHS systems.

Related: Legislation Would Stiffen Penalties for Ransomware Attacks

Related: Bipartisan Legislation to Require DHS Alerts on Election Hacking

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Incident Response

Cygnvs emerges from stealth mode with an incident response platform and $55 million in Series A funding.

Management & Strategy

Microsoft making a multiyear, multibillion dollar investment in the artificial intelligence startup OpenAI, maker of ChatGPT and other tools.

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Funding/M&A

Thoma Bravo will spend $1.3 billion to acquire Canadian software firm Magnet Forensics, expanding a push into the lucrative cybersecurity business.