Bill would allow U.S. intelligence to share cyber-threat info
The legislation would help protect U.S. businesses against cyberattackers, the sponsors say
IDG News Service - A bill introduced by senior members of the House Intelligence Committee would allow intelligence agencies to share classified cyber-threat information with approved U.S. companies, while encouraging companies to share their own information.
The Cyber Intelligence Sharing and Protection Act, introduced Wednesday, is a "significant first step" toward protecting the U.S. government and businesses from constant cyberattackers, said U.S. Rep. Mike Rogers (R-Mich.), the committee chairman. "There is a cyberwar that is going on today," Rogers said during an event to announce the bill.
The bill would direct the U.S. director of national intelligence to set up a process for intelligence agencies to share cyber-threat information and for granting security clearances at organizations that want to receive the information. Businesses that receive the classified information would generally be limited in their use of the information to protecting themselves or their customers.
The bill would also give lawsuit protection to companies that use the information to protect their networks or share cyber-threat information. The bill would allow companies to share cyber-threat information anonymously through an undefined process or restrict those with whom they information, including the government.
"If we're going to win this fight, we have to have more sentries on guard," Rogers said. "What this bill will do is leverage every private IT security operation in every company in America to be on guard."
The bill does not require companies to share any information and includes no new mandates for businesses, Rogers said. "These companies are under assault every single day," he said. "It is in their best interest to cooperate."
Without improved cybersecurity the U.S. will have a "catastrophic" cyberattack within the next year, predicted cosponsoring Rep. C.A. "Dutch" Ruppersberger (D-Md.) the senior Democrat on the committee. "We simply can't stand by if we have the ability to help American companies protect themselves," he said. "Sharing information about cyber-threats is a critical step to preventing them."
Trade groups the Information Technology Industry Council and the National Cable and Telecommunications Association (NCTA) were among the organizations voicing support for the bill. The cyber-threats facing U.S. businesses are "deeply frightening," and the bill will improve national security, said Michael Powell, NCTA's president and CEO.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is email@example.com.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts