Historic Cybersecurity Law Is Up for Renewal
By Matthew Eggers, Vice President, Cybersecurity Policy, U.S. Chamber of Commerce
While Popular, CISA 2015 Needs Its Advocates
Before it expires on September 30, 2025, the U.S. Congress must reauthorize the Cybersecurity Information Sharing Act of 2015 (CISA 2015). A key cornerstone of American cybersecurity efforts is CISA 2015, which improves companies’ capacity to address cybersecurity threats at scale and react quickly to modern cyberthreats.
If CISA 2015 lapses, the U.S. will face a more complex and hazardous security environment. Various foreign cybercriminals use techniques like phishing and ransomware to threaten our key critical infrastructure, advanced commercial capabilities, and economic well-being. Malicious hackers target local branches, offices, and warehouses in addition to major national corporations. Their attacks impact people, businesses, and their surrounding communities.
While reauthorizing CISA 2015 is a top policy priority for many in industry and government,1 it needs its advocates. The congressional to-do list, including approving budget related legislation, advancing pro-growth tax policy, and passing the annual defense bill, is extensive. Deadlines are rapidly approaching.
The good news is that CISA 2015 has had the support of both Democrats and Republicans. When taking up the bill a decade ago, the Senate Intelligence Committee stated it was convinced that the legislation was needed to enable bilateral information sharing between industry and government to better address our nation’s shared cybersecurity challenges.
Meanwhile, on the other side of the Capitol, House Homeland Security Committee leadership emphasized that information about a cyberattack experienced by one business can help others fortify their defenses. But when the sharing does not occur, it leaves all of us more vulnerable, said the chairman of the Cybersecurity, Infrastructure Protection, and Security Technologies Subcommittee, because the same criminals can use the same tactics to target other entities.
Advocates for CISA 2015 cannot take its reauthorization for granted. It’s easy to overlook how challenging it is to enact legislation that has widespread support. In November 2011, I first read a draft bill that would eventually become CISA 2015. However, it took four years of negotiations among Congress, the Obama administration, and various private-sector stakeholders to get it passed into law.
You are to be extremely vigilant & watchful to guard against surprizes, & to use every means in your power to obtain a knowledge of the Enemys Numbers—Situation—and designs. … Every piece of Intelligence you may think of Importance for me to know, communicate it without wasting time.
———George Washington to Brig. Gen. William Maxwell, December 1776
‘Our Adversaries Want CISA to Expire’
At the U.S. Chamber, I lead a working group made up of approximately 250 companies and business associations that represent nearly every sector of the U.S. economy. A number of individuals have told me that, due to the importance of CISA 2015 to U.S. economic and national security, our adversaries want it to expire.
Readers of this magazine don’t need to know the specific provisions of CISA 2015 to understand that swapping data on cyber threats and incidents complicates attackers’ operations as defenders learn what to monitor and prioritize. CISA 2015 enables private entities to enhance the protection of their data, devices, and computer systems while promoting the sharing of cyber threat information with business and government partners within a secure policy and legal framework. In order to encourage prompt information sharing between public and private institutions, it also offers safeguards for enterprises in relation to regulatory matters, public disclosure, and antitrust matters. Under CISA 2015, both government and industry have a proven track record of protecting civil rights and privacy.
CISA 2015 Increases Collaboration and Imposes Costs on Criminals
An economist may say that CISA 2015 aims to reduce businesses’ opportunity costs and impose them on malicious actors (e.g., criminal organizations and foreign nation-states). Indeed, since the implementation of CISA 2015, collaborations in cybersecurity have improved significantly in several ways, including encouraging the development and expansion of information sharing and analysis centers (ISACs) across multiple sectors. These centers act as focal points for exchanging cybersecurity information within particular industries, which improves the ability to detect and respond to threats specific to those sectors.
For example, CISA 2015 enabled the Health-ISAC to deliver substantial value to the healthcare and public health (HPH) sector by fostering a trusted environment for sharing timely, relevant, and actionable threat intelligence and best practices. A prime example of this value in action occurred during the 2017 NotPetya cyberattack. The malware spread rapidly, impacting thousands of organizations around the globe and in every critical infrastructure sector. In the HPH sector, NotPetya caused major disruptions to hospital systems, pharmaceutical manufacturing, and healthcare supply chain vendors. Within hours, the Health-ISAC facilitated crucial real-time information sharing among its members.
The collaboration led to a swift understanding of the attack, the mechanisms of the malware’s propagation, and the development of mitigation strategies, including a “vaccine,” to prevent the malware from spreading. The Health-ISAC became a force multiplier in defending against widespread cyber threats as this information was rapidly disseminated across the health sector, enabling even small and rural hospitals to halt the attack and prevent significant disruption to healthcare in local communities. This type of information-sharing partnership is just one example of the various partnerships that occur across critical infrastructure and government on a minute-by-minute basis.
U.S. Cybersecurity Relies on Trust
Cyber incidents underscore the need to renew CISA 2015 to help businesses enhance their understanding of cybersecurity threats and strengthen their protection and response capabilities in collaboration with government entities. Further, if the law lapses this fall, many are most concerned about the weakening of trust among people and institutions.
Interpersonal trust cannot be mandated by policy. It is a mindset that takes years to cultivate, which should prompt lawmakers to take action. If CISA 2015 isn’t extended, the ability to create and maintain trust would be weakened, leading to unintended consequences for the security and resilience in communities across America.
CISA 2015 not only sets the tone for sharing and receiving threat indicators and defensive measures, but it also fosters trust among businesses and government allies. Policymakers should not take such trust and public-spiritedness for granted. These attitudes are not codified anywhere but are foundational to U.S. economic and national well-being. Even a partial lapse of CISA 2015 could impact our cyber defenses. Congress must act.
References:
1In April 2025, U.S. Sens. Gary Peters (D-MI), the ranking member of the Senate Homeland Security and Governmental Affairs Committee, and Mike Rounds (R-SD) introduced a bipartisan bill to extend CISA 2015 for 10 years. In addition, U.S. Department of Homeland Security Secretary Kristi Noem called for reauthorizing the law.
On May 13, 2025, 52 associations, led by the U.S. Chamber of Commerce, sent a letter to the full U.S. Congress urging lawmakers to reauthorize CISA 2015.
