Cyber info sharing ‘holding steady’ despite lapse in CISA 2015, official says

The sharing of digital threat information between the federal government and industry has remained consistent despite the expiration of a landmark cybersecurity law last month, a senior U.S. official said on Thursday.

“It’s holding steady right now,” Nick Andersen, executive assistant director for the cybersecurity division at the Cybersecurity and Infrastructure Security Agency, told reporters on the sidelines of the Palo Alto Networks Public Sector Ignite 2025 conference in Tysons Corner, Virginia.

That the cooperation continues “is a testament to CISA’s reputation that it’s built up and our ability to have long-term collaboration tools,” he added.

Andersen’s comments come roughly a month after the expiration of the 2015 Cybersecurity Information Sharing Act, which incentivized private entities to share threat data with the government with antitrust and liability safeguards. 

There has been widespread concern since the authority went dark that teamwork between the two sides would evaporate after years of incremental progress.

The House Homeland Security Committee advanced a bill to renew the effort last month and a short-term extension was attached to a stopgap government funding measure that eventually failed in the Senate and triggered the ongoing government shutdown. 

Earlier this month, Senate lawmakers introduced an updated renewal bill that would retroactively protect companies that share information during the shutdown.

Sen. Gary Peters (MI), the top Democrat on the Senate Homeland Security, and his colleagues have repeatedly gone to the Senate floor, including as recently as this week, for a quick voice vote to extend the 2015 law for 10 years only to be blocked by panel chair Rand Paul (R-KY).

Despite the ongoing cooperation, Andersen said the 2015 statute is “core and critical to us being able to accomplish our jobs and help manage risk more widely within the ecosystem.”

“We need a clean [reauthorization] for 10 years, just as we saw with CISA 2015, in order to be able to support the long-term mission success of CISA as an agency.”

He stressed the ongoing work between the two sectors is “relationship-based and based on the need for operational imperative.”

“I hate to see what’s going to continue to happen, though, after we get past the shutdown and we start having these longer conversations with the vendor ecosystem,” Andersen told reporters.

Speaking at the conference earlier today, National Cyber Director Sean Cairncross described the 2015 statute as “vital.”

“It’s a common-sense law,” he told the audience. “The White House is pushing for a 10-year, clean reauthorization of this authority. It’s something that we want to see done. It’s important to national security and it fosters the sort of collaboration, not only amongst the private sector, but between the public and private sector that’s vital.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Martin Matishak

Martin Matishak

is the senior cybersecurity reporter for The Record. Prior to joining Recorded Future News in 2021, he spent more than five years at Politico, where he covered digital and national security developments across Capitol Hill, the Pentagon and the U.S. intelligence community. He previously was a reporter at The Hill, National Journal Group and Inside Washington Publishers.

 

Total
0
Shares
Previous Post

Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Next Post

A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

Related Posts

HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks

Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute malware. "The attackers manipulated search rankings with SEO plugins and registered lookalike domains that closely mimicked legitimate software sites," Fortinet FortiGuard Labs researcher Pei Han Liao said. "By using convincing language and small character
Read More

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Cybercriminals associated with a financially motivated group known as GoldFactory have been observed staging a fresh round of attacks targeting mobile users in Indonesia, Thailand, and Vietnam by impersonating government services. The activity, observed since October 2024, involves distributing modified banking applications that act as a conduit for Android malware, Group-IB said in a technical
Read More

No Time to Waste: Embedding AI to Cut Noise and Reduce Risk

Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. Cybercriminals are using AI-powered tools to accelerate and automate attacks at a scale defenders have never faced before. Security teams are overwhelmed by an explosion of vulnerability data, tool outputs, and alerts, all while operating with finite human resources. The irony is that while AI has become a
Read More