16790 Centre Ct. Parker, CO 80134     Tel 303-840-8484     Fax 303-840-6150 
Hours of Operation:  Lobby Mon - Fri 9am to 5pm     Drive Through Mon - Fri 8am to 5pm

May 2016 Newsletter

5/1/16 10:00 AM / by Thomas F. Duffy, Chair, MS-ISAC

Thomas F. Duffy, Chair, MS-ISAC

Cybersecurity Information Sharing Act

We've all heard talk of the Cybersecurity Information Sharing Act, but what does it really mean? We hope that this newsletter is a quick cheat sheet that highlight the key takeaways, as well as provide resources for additional information if you'd like to conduct a deeper dive into the topic.

THE BASICS

President Barack Obama signed the Cybersecurity Information Sharing Act of 2015 (CISA) into law on December 18, 2015, as Division N of the Consolidated Appropriations Act of 2016. While there are four cyber components to Division N, CISA arguable has some of the most far-reaching implications as it authorizes cybersecurity information sharing between and among the private sector; state, local, tribal, and territorial governments; and the Federal Government.

The term cyber threat information, as referenced in the Cybersecurity Information Sharing Act of 2015, is made up of the following:

    • Cyber Threat Indicator - information that is necessary to describe or identify: malicious reconnaissance; a me thod of defeating a security control or exploitation of a security vulnerability; a security vulnerability; a method of causing a user with legitimate access to an information system or information that is stored on, processed by, or transiting an informat ion system to unwittingly enable to defeat of a security control or exploitation of a security vulnerability; malicious cyber command and control; the actual or potential harm caused by an incident, including a description of the information exfiltrated as a result of a particular cybersecurity threat; any other attribute of a cybersecurity threat, if disclosure of such attribute is not otherwise prohibited by law; or any combination thereof.
    • Defensive Measure is defined as an action, devices, procedure, signature, technique, or other measure applied to an information system or information that is stored on, processed by, or transiting an information system that detects, prevents, or mitigates a known or suspected cybersecurity threat or security vulnerability.

WHAT DOES IT MEAN?

    • CISA details how public and private entities share cyber information and establishes provisions for the information's protection, including the protection of personally identifiable information (PII).

Specifically, it:

    • Requires the federal government to release periodic best practices. Entities will then be able to use the best practices to further defend their cyber infrastructure.
    • Identifies the federal government's permitted uses of cyber threat indicators and defensive measures, while also restricting the information's disclosure, retention and use.
    • Authorizes entities to share cyber threat indicators and defensive measures with each other and with DHS, with liability protection.
    • Protects PII by requiring entities to remove identified PII from any information that is shared with the federal government. It requires that any federal agency that receives cyber information containing PII to protect the PII from unauthorized use or disclosure. The U.S. Attorney General and Secretary of the Department of Homeland Security will publish guidelines to assist in meeting this requirement.

SOME GUIDANCE

There were four documents that were delivered to Congress that DHS has posted online. All of which were meant to provide some guidance while seeking compliance with CISA. These documents are available at https://www.uscert.gov/ais and include:

Topics: Newsletter

Subscribe to Email Updates

Archives

The Champion Bank


You are now being directed to an external site
Ok