Bill would allow U.S. intelligence to share cyber-threat info
The legislation would help protect U.S. businesses against cyberattackers, the sponsors say
IDG News Service - A bill introduced by senior members of the House Intelligence Committee would allow intelligence agencies to share classified cyber-threat information with approved U.S. companies, while encouraging companies to share their own information.
The Cyber Intelligence Sharing and Protection Act, introduced Wednesday, is a "significant first step" toward protecting the U.S. government and businesses from constant cyberattackers, said U.S. Rep. Mike Rogers (R-Mich.), the committee chairman. "There is a cyberwar that is going on today," Rogers said during an event to announce the bill.
The bill would direct the U.S. director of national intelligence to set up a process for intelligence agencies to share cyber-threat information and for granting security clearances at organizations that want to receive the information. Businesses that receive the classified information would generally be limited in their use of the information to protecting themselves or their customers.
The bill would also give lawsuit protection to companies that use the information to protect their networks or share cyber-threat information. The bill would allow companies to share cyber-threat information anonymously through an undefined process or restrict those with whom they information, including the government.
"If we're going to win this fight, we have to have more sentries on guard," Rogers said. "What this bill will do is leverage every private IT security operation in every company in America to be on guard."
The bill does not require companies to share any information and includes no new mandates for businesses, Rogers said. "These companies are under assault every single day," he said. "It is in their best interest to cooperate."
Without improved cybersecurity the U.S. will have a "catastrophic" cyberattack within the next year, predicted cosponsoring Rep. C.A. "Dutch" Ruppersberger (D-Md.) the senior Democrat on the committee. "We simply can't stand by if we have the ability to help American companies protect themselves," he said. "Sharing information about cyber-threats is a critical step to preventing them."
Trade groups the Information Technology Industry Council and the National Cable and Telecommunications Association (NCTA) were among the organizations voicing support for the bill. The cyber-threats facing U.S. businesses are "deeply frightening," and the bill will improve national security, said Michael Powell, NCTA's president and CEO.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts