What to Know About the Cybersecurity Information Sharing Act
In late 2015, President Obama signed the Cybersecurity Information Sharing Act (CISA) into law. This law is designed to improve cybersecurity within the United States by the sharing of information among agencies as it pertains to cybersecurity threats. This enables
cyber threat intelligence to be shared among all levels of government covered by CISA, including cyber traffic between government entities as well as among any type of industry handling sensitive data. In other words, routing threat information between federal agencies and private sector companies in seamless communication along a protected route is the goal of CISA.
While CISA touts open communication, it includes provisions that prevent personally identifiable data irrelevant to cybersecurity from being transmitted among agencies. Both the Department of Homeland Security (DHS) and Information Sharing and Analysis Centers (ISACs) offer liability protection after all personal identifiable information is removed. Once all relevant data is gathered, the cyber threats shared among different government entities can be used to prosecute criminals who commit cyber crimes. It can also be collected as evidence in cases where crimes involving not only cybersecurity, but physical force related to the cyber threats, are prosecuted.
CISA is a two-way communication when sensitive data is shared. The organization sharing the information must disseminate it quickly, and the receiving party must also be able to evaluate cyber threats and determine the best method to respond and share that data. Likewise, only individuals granted authorized access are able to handle sensitive information shared via CISA, which keeps personal records from being distributed.
Sharing information, such as personal records in regard to cyber-attacks, is as complex as it is sensitive. Call 877-624-4999 concerning NC4 Mission Center™ or any of NC4's other outstanding safety and security cyber exchange solutions. Please browse our website as it contains risk management, public safety, and
cyber threat intelligence information.
Back to Cyber Security | Back to All Categories