Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Wednesday, September 10
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » US politicians ponder Wimwig cyber intel sharing law
    Latest News

    US politicians ponder Wimwig cyber intel sharing law

    TeamBy TeamSeptember 8, 2025No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    US Treasury incident a clear warning on supply chain security in 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A long-awaited update to the US’s Cybersecurity Information Sharing Act (CISA) of 2015 – which lapses at the end of September amid gathering concerns over compliance gaps and increased risk to end-user organisations – is advancing through Congress in Washington DC.

    The replacement legislation, now named the Widespread Information Management for the Welfare of Infrastructure and Government (Wimwig) Act – not least to avoid confusion with the CISA – passed the House Homeland Security Committee at the start of September.

    “Stakeholders from across industry sectors have endorsed this legislation because it preserves the essential privacy and liability protections in the Cybersecurity Information Sharing Act of 2015, clarifies the law’s language to better address the evolving threat landscape, and ensures private-sector insight is properly captured,” said representative Andrew Garbarino, chairman of the House Homeland Security Committee.

    “Failing to ensure the relevance and efficacy of one of the federal government’s most foundational cyber security tools for the next decade would threaten not only our networks, but also the security of the homeland,” he said.

    “Today’s swift advancement of the Wimwig Act … underscores the House Homeland Security Committee’s bipartisan commitment to enhancing our nation’s cyber security posture,” added Garbarino.

    “Congress must get both bills to President Trump’s desk without delay.”

    What is CISA 2015?

    CISA 2015 is a Barack Obama-era law that enacted legal protections and safeguards for organisations to share threat intelligence and other critical cyber security data with one another, and with the government.

    Cynthia Kaiser, senior vice-president of the Ransomware Research Center at Halcyon Security, and until recently deputy assistant director for cyber policy, intelligence and research at the FBI’s cyber division, described CISA 2015 as the “backbone” of cyber defence, and said it had helped ward off innumerable cyber attacks in the past decade by providing timely intelligence to potential victims, as well as helping enable multinational law enforcement operations targeting cyber criminality.

    Speaking to Computer Weekly this week, Kaiser said that when CISA 2015 was enacted, it was driven by a recognition that there needed to be protections in place to enable people to share cyber intelligence without fear of legal repercussions.

    For example, with CISA 2015 in place, a hypothetical managed service provider that was compromised in a supply chain attack affecting its downstream customers is protected from being held liable for handing victim data over to the FBI or other agencies as part of the investigation.

    “What I used to tell people at the FBI all the time is that we can’t protect you and we can’t protect others if we don’t hear from you,” said Kaiser.

    “If a company is doing the right thing and coming to the federal government to provide information about a malicious cyber campaign that’s occurring, then they have certain protections in place that enable them to do that [and] that lowers the risk for them to be able to come to the government.

    “There’s a second aspect where it also provides antitrust protection for industry-to-industry sharing,” she added. “Now I run the Halcyon Ransomware Research Center – we want different companies to come together and share cyber intelligence together, but if we do that there could be potential for someone to say, ‘if you all are getting together, it’s a monopoly’.”

    Potential threat to global cyber collaboration

    CISA 2015 was enacted with a 10-year sunset clause – which is not uncommon – to enable lawmakers to establish if it had been effective, and according to Kaiser, also partly due to concerns that the federal government could use it as a means to gather more private data.

    In the first regard, she said, it has been an unequivocal success, and, thankfully, there is strong bipartisan support from both Democrats and Republicans for getting Wimwig over the finish line.

    But absent the passage of Wimwig, the imminent expiration of CISA 2015 was beginning to raise significant concerns among cyber and national security experts in Washington.

    “What we can’t have is these conversations still being arbitrated and then have it [CISA 2015] expire on 30 September, because even a month’s lapse would cause problems,” said Kaiser.

    “I’ve spoken with lawyers who are outside breach counsels, and they’ve indicated that if this act lapses, they will likely have to change the advice they give to companies when considering whether they’re going to contact the federal government,” she said.

    But beyond the US’s borders, if CISA 2015 was to lapse without continuity in place, the security sector could expect to see worldwide impacts, said Kaiser. Almost immediately, the timely threat information and updates coming out of federal agencies such as CISA would begin to ease off, and this would likely mean bulletins such as the late-August advisory on China’s Salt Typhoon – co-signed by the US and British authorities, and counterparts across Europe and in Australia, Canada and New Zealand – would either reduce in their cadence or cease altogether.

    Furthermore, the ability of frontline cyber cops, such as those at the UK’s National Crime Agency to conduct effective operations against cyber criminals, would also be hit, while user organisations would also see less information coming from their own governments because they are in turn receiving less data from the US.

    The second concern, she said, is that the frequency and quality of information sharing among cyber security suppliers and across industries would reduce based on antitrust and other compliance and liability concerns.

    “We’re all competitors, but we’re also very collaborative, especially on cyber threat intelligence,” said Kaiser. “We’ve gotten so used to that over the last 10 years that it now just really underpins how we do business. Overall, I think information sharing globally would deteriorate if this isn’t reauthorised.”

    Updates welcomed

    The draft version of Wimwig contains much to be positive about, said Kaiser. Importantly, it clarifies some areas around liability protections that were left somewhat vague by CISA 2015.

    “Some took a more sweeping, broad read of it, and some took more narrow reads of it,” she said. “The broad read is I think what we wanted people and companies to have, so clarifying those liability protections is a great edit moving forward.”

    Wimwig also includes updated definitions to encompass emergent cyber attack tactics, techniques and procedures, like artificial intelligence (AI), which have advanced apace since 2015, and procedural updates to preserve protections for civil liberties and privacy.

    The act additionally ensures private sector organisations – especially small to medium-sized enterprises – receive more information through mechanisms such as one-time read-ins for at-risk organisations such as critical infrastructure operators; directs federal bodies to provide technical assistance to the private sector on a voluntary basis; and encourages the use of secure AI.

    It also enhances Congress’s oversight, and the effectiveness, of the Automated Indicator Sharing programme – a real-time data-sharing capability developed by the Department of Homeland Security.

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Splunk.conf: Splunk and Cisco showcase unified platform

      September 9, 2025

      Jelly Beans for Grapes: How AI Can Erode Students’ Creativity

      September 8, 2025

      25 insights about what back-to-school season has in store

      September 8, 2025

      Head Start Funding Is on Track for Approval. It Still May Not Be Enough.

      September 7, 2025

      4 tips to create an engaging digital syllabus

      September 7, 2025

      Water efficiency of English datacentres scrutinised in TechUK report

      September 6, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202466 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202429 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202423 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202518 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views
      Reviews

      Foundation Website Creation with CSS, XHTML, and JavaScript

      September 10, 2025

      The Theory of Money and Credit

      September 10, 2025

      V4 R828D RTL2832U 1PPM TCXO SMA Software Defined Radio (Dongle Only)

      September 10, 2025

      Excel Data Analysis Visualization with Management Technique | Udemy Coupons 2025

      September 10, 2025

      Area Manager

      September 10, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Splunk.conf: Splunk and Cisco showcase unified platform

      September 9, 2025

      Jelly Beans for Grapes: How AI Can Erode Students’ Creativity

      September 8, 2025

      25 insights about what back-to-school season has in store

      September 8, 2025

      US politicians ponder Wimwig cyber intel sharing law

      September 8, 2025

      Head Start Funding Is on Track for Approval. It Still May Not Be Enough.

      September 7, 2025
      Latest Videos

      Is Accounting the worst finance career???

      September 7, 2025

      Kickstart Your Digital Marketing Career with NIMS Academy: Learn SEO, Content Creation & More!

      September 6, 2025

      RecruitCRM , Scaler , Amazon |2021, 2022 , 2023 , 2024 jobs

      September 4, 2025

      Career in Advertising #Advertising #creativity #design #media #buyer #planner #marketing #promotion

      September 2, 2025

      Cyber security insights #15/200 by white fortress academy #ethicalhacking

      September 1, 2025
      Latest Jobs

      Area Manager

      September 10, 2025

      Costco Free Sample Representative

      September 10, 2025

      Customer Experience Coordinator

      September 9, 2025

      Sr. Engagement Manager, Retail

      September 9, 2025

      UI/UX Designer III – D

      September 9, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202535 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      ISO 9001:2015 – Quality Management System Internal Auditor | Udemy Coupons 2025

      May 5, 202534 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202522 Views
      Blog

      The Best Jewelry Brands For Creating a Positive First Impression at Work –

      September 9, 2025

      AI Took My Job: Reskill, Adapt, and Thrive in Your Career

      September 5, 2025

      Finding Purpose in Life –

      August 31, 2025

      How Helya Mohammadian Is Leading the Charge for Accessible Intimates with Slick Chicks –

      August 30, 2025

      Here is MsCareerGirl’s compiled, vetted list of all the major career and job websites you should strongly consider registering for, browsing listings and posting your resume.

      August 29, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT