Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity NewsGovernment: Federal, State and Local

Debating CISA's Senate Passage

November 2, 2015

The US Senate recently passed the Cybersecurity Information Sharing Act - or CISA - by a wide 74-21 margin.

The Senate vote in favor of CISA, came after multiple attempts spanning five years to pass similar legislation under different names. The bill also drew on the highly controversial "cyber" legislation before it: SOPA and PIPA.

Some of the tech companies that have raised concerns about CISA include Google, Apple, Microsoft and Oracle. But CISA sponsor Senator Richard Burr addressed those companies ahead of the vote, saying "Do not try to stop this legislation and put us in a situation in that we ignore the fact that cyber attacks are going to happen with greater frequency for more individuals, and that the sooner we learn how to defend our systems, the better off personal data is in the United States of America."

The stated purpose of CISA is to allow companies to share information in real time about perceived hacking threats, but critics of the bill warn it's a legal framework for mass surveillance in cybersecurity clothing.

We recently spoke with Richard Parris, CEO of cybersecurity firm Intercede, who emphasizes the need to balance security and privacy moving forward ­ especially among digital natives.

Don’t we already have public distrust of how our data is handled? Would passage of this legislation really change that?

It’s true there is already public distrust towards government data practices – a quarter of Millennials feel the government is already accessing their data with or without their consent. The issue here comes down to what happens if that distrust grows? While the bill may be an attempt to prevent network security breaches, the potential infringements on data privacy could result in a greater backlash. In fact, forty-four percent of Millennials predict a decline in data sharing and a significant portion theorize a decline in economic and political stability if businesses and governments fail to protect online identifying data. The government should heed these figures as a warning – while network security is important, citizens do not want to see their individual data privacy compromised, the bill needs to strike a balance between the two.

Would amendments or ways to “soften” it, help acceptance of the legislation? Or would it be too harmful to it?

Initially there were several amendments that were considered. Some passed, some were defeated. Many dealt with whom in the government would be on-point to coordinate and disseminate the data, while others addressed the issue of securing individual's privacy. It comes down to who has access to see personal identifying data and who doesn’t. The government has long tried to approach these types of concerns by targeting different levels of access rather than enabling individualized access. It’s a case of proper identity management, who should have access to see vital personal data and who should not. The bill needs to show a commitment to truly protecting personal information from prying eyes that really have no place having access to it in the first place.

If the bill doesn’t become law, what could be the repercussions?

The bill hasn't become law yet, and there is still a long road before it becomes enacted. The Senate has passed its version, as has The House, and now the two need to be reconciled in a Conference Committee. Chairman Burr, the bill's chief cosponsor in the Senate, has indicated that a compromise bill won't be ready until January – at the earliest. The compromise will then need to pass both the House and Senate before the President can actually sign it into law. Regardless of if this bill does or does not pass, it is putting the issue of cybersecurity front and center. There is recognition that something must be done to prevent the influx of cyberattacks, and until the right safeguards are in place to protect peoples' online data the repercussions that stand to come will echo what we have already seen today: increased network breaches, compromised personal data and a decline in the public’s trust towards government and business.

If the legislation becomes law, what can consumers expect to see?

Senator Feinstein, the bill's primary Democratic sponsor, said yesterday that this bill is a first step to protect the United States from cyberattacks - indicating that future legislation will focus on data security and safeguarding critical infrastructure from cyberattacks. That opens up a whole different conversation about how to secure the growing Internet of Things (IoT) to ensure that, as more and more devices communicate with one another, there are security measures and protections in place that are up to the task. Whether it’s connected cars, smart grids or critical public networks, security stands to continue to be a pivotal part of future legislation as the government looks to create standards for proper streamlined communication protocols.

Beyond this legislation, what else can be done within industry to secure data?

It drills down to investing in – and actually implementing – up to date technology practices. The Federal Government has long had recognized standards that favor enhanced identity management and authentication procedures beyond simple passwords. FIPS 201 is a United States federal government standard that specifies Personal Identity Verification (PIV) requirements for Federal employees and contractors – the provision calls for two-factor authentication and a derived credentials system. The standard was created in 2005 to ensure an added level of security and to deter hacks – the problem has been a lack of understanding about how the use of the PIV card can be extended. One can’t help but wonder if the issue isn’t a need for legislation – but a real need to invest in properly deploying the type of technology that enables users to connect to a network without compromising security or personal data privacy.

 

 


 

KEYWORDS: CISA cyber legislation cyber security data protection data theft

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SIA Hails Senate Passage of Cooperative Purchasing Legislation

    See More
  • Debating the Future of Cyber Attacks

    See More
  • Debating the NSA, Espionage and Hackers with Congressman Mike Rogers

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing