Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsGovernment: Federal, State and Local

CISA 2015 Closes in on Expiration, Security Leaders Share Concerns

By Jordyn Alger, Managing Editor
Old computers in dark building
Artem Gilmutdinov via Unsplash
September 19, 2025

The Cybersecurity Information Sharing Act of 2015 (CISA 2015) is set to expire Sept. 30. At this time, policymakers have yet to renew it, although a continuing resolution was presented this week in the House of Representatives. 

CISA 2015 constructed a “a cybersecurity information sharing structure” that allowed the federal government to gather and share threat intelligence. Furthermore, the private sector was enabled to share similar intelligence with the government and amongst each other. As the expiration of this act nears, cybersecurity leaders are expressing their concern. 

Patrick Beggs, CISO at ConnectWise, shares, “I view the looming expiration of CISA 2015 with significant concern. Without the legislation in place, companies may hesitate to disclose indicators of compromise or attack vectors, creating a chilling effect that erodes trust and collaboration.” 

The capabilities of cyber adversaries have increased in sophistication and scale since the establishment of CISA 2015, especially with the introduction of greater AI threats. Without proper protective measures in place, these threats could leave organizations vulnerable. 

Beggs explains, “The timing is especially critical, as adversaries now leverage AI, ransomware-as-a-service, and state-backed resources to disrupt both critical infrastructure and private enterprises. Losing the protections of CISA would force defenders to operate in silos, causing them to be blind to patterns that could otherwise be mitigated if knowledge were shared openly. Our adversaries thrive on information asymmetry, and any gap in coordination works to their advantage. Beyond the immediate tactical risks, the expiration of CISA risks undermining long-term national security resilience. The act has been a cornerstone in fostering public-private partnerships, and if that framework dissolves, it will take years to rebuild trust and momentum. Policymakers must recognize that cybersecurity is a team sport, and the expiration of CISA would not only weaken our defenses but also embolden our adversaries at a moment when unity and vigilance are paramount.”

Joel Burleson-Davis, CTO at Imprivata, adds, “Cyber adversaries are scaling up. AI is making attacks faster, cheaper, and more precise —especially against critical infrastructure. For the past decade, the Cybersecurity Information Sharing Act of 2015 has been our early-warning system, enabling real-time signal-sharing so defenders can spot sparks before they become wildfires. If CISA lapses at the end of September, policymakers warn we could lose as much as 90% of those alerts.”

While the expiration of CISA 2015 would affect all organizations within the United States, some industries could see greater consequences than others. 

“The stakes are highest in sectors like healthcare and manufacturing, where minutes matter,” Burleson-Davis declares. “A slowdown in threat intelligence can cascade into care delays, supply chain disruption, and safety risks. Losing CISA’s liability protections, antitrust exemptions, and nondisclosure safeguards would also chill the willingness of organizations to share what they’re seeing — exactly when we need more eyes, not fewer.”

However, simply renewing CISA 2015 may not be enough. With the evolution of cyber threats over the last decade, the renewal must include timely updates to ensure it is modern and effective. 

Kyle Dewar, Tanium’s Executive Client Advisor, Federal, states, “CISA 2015 enables the teamwork that drives cyber outcomes protecting our citizens, our government, our critical infrastructure, and our corporations. Since 2015, cyber threats have continued to evolve in both persistence and complexity, so, naturally, emergent threats, AI, and supply chain attacks should be incorporated into the modernization of CISA 2015.

“With great power comes great responsibility, and renewing CISA 2015 should focus on correlation, collaboration, and coordination of cyber threats and adversary cyber actions to foster transparency of threat reporting. My call to action is to understand both the concerns (privacy & civil liberties) and the areas of agreement with CISA 2015. Modernizing CISA 2015 should continue safe harbor protections that have a proven record of success, where threat indicators and defensive cyber actions are reported, analyzed, and authoritatively shared by the Cybersecurity and Infrastructure Security Agency with government agencies, corporations, partners, and allies. Measuring the performance of a modernized CISA 2015 through mean-time-to-share (MTTS) or mean-time-to-exchange (MTTE) of threat information would enable measurement of performance indicators that align outcomes driven by CISA 2015 with national security and criminal justice needs of our nation and citizenry.”

In a time where many organizations are already unprepared for cyberattacks as is, the expiration of CISA 2015 could be a significant setback. Nevertheless, organizations should not wait to hear the outcome of CISA 2015’s renewal before taking charge of their security posture. 

Burleson-Davis concludes, “Regardless of what Congress does, operators should act now to blunt any intelligence gap — in cybersecurity, unity and urgency aren’t optional, they’re how we keep the lights on and data, systems and people safe.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • DNA

    23andMe declares bankruptcy, security leaders discuss data concerns

    See More
  • Office supplies

    Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

    See More
  • Red and black electronic chip

    Research uncovers new attack method, security leaders share insights

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing