Regulatory Harm or Harmonization? Examining the Opportunity to Improve the Cyber Regulatory Regime

Cybersecurity and Infrastructure Protection

2025-03-11

Loading video...

Source: Congress.gov

Summary

This meeting of the Committee on Homeland Security convened to assess the efficacy of the federal cyber regulatory regime and identify opportunities for harmonization across the federal government, particularly focusing on the challenges faced by critical infrastructure operators and the implementation of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). Speakers highlighted the urgent need to streamline duplicative reporting requirements and foster stronger public-private partnerships to enhance national cybersecurity.

Themes

Challenges with the Current Cyber Regulatory Regime

The current federal cyber regulatory landscape is characterized by its cumbersome, duplicative, and complex nature, imposing significant burdens on critical infrastructure owners and operators. With over 50 regulations at the federal level alone, companies spend considerable time and resources on compliance tasks rather than on actual security improvements. This fragmentation leads to misalignment, confusion, and can consume up to 70% of cybersecurity resources. A prime example of problematic rulemaking is the Securities and Exchange Commission's (SEC) requirement for cyber incident disclosure within four business days, which speakers argued could harm national security by revealing vulnerabilities to adversaries before they are patched[ 01:20:22 ]

[ 01:20:32 ] .

Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Implementation

There is bipartisan concern that the proposed CIRCIA rule deviates significantly from congressional intent by having an overly broad scope for "covered entities" and "covered incidents". Stakeholders emphasized the need for CISA to meaningfully incorporate industry feedback, urging the withdrawal and reissuance of the proposed rule or, at minimum, establishing an "ex parte" process for transparent engagement. Without proper refinement, the rule risks overwhelming CISA with an unmanageable volume of reports and burdening critical infrastructure operators, potentially doing "more harm than good"[ 00:55:41 ]

.

Cybersecurity Information Sharing Act (CISA) of 2015 Reauthorization

The Cybersecurity Information Sharing Act of 2015, set to expire in September 2025, is considered foundational for public-private collaboration in cybersecurity. Its protections, including liability and antitrust exemptions for sharing cyber threat information, have fostered increased collaboration across sectors[ 01:06:37 ]

. Speakers warned that the expiration of this Act would significantly undermine national security by impeding critical information sharing and forcing companies to reorganize established processes[ 01:08:07 ] .

Role of the Critical Infrastructure Partnership Advisory Committee (CIPAC)

The recent disbandment of the Critical Infrastructure Partnership Advisory Committee (CIPAC) by the Department of Homeland Security raised significant concerns among speakers[ 01:21:56-01:22:06 ]

. CIPAC was lauded as a vital framework for effective industry-government partnership, providing protected dialogue and facilitating information sharing for a wide range of hazards, not just cyber threats[ 01:23:52 ] [ 01:24:09 ] . Speakers clarified that CIPAC is distinct from a typical advisory committee and its termination jeopardizes a successful, long-standing mechanism for collaboration[ 01:24:41 ] [ 01:24:49 ] [ 01:24:57 ] .

Offensive Cyber Capabilities and Active Defense

A debate emerged regarding the need for offensive cyber capabilities, particularly given the increasing frequency and sophistication of cyberattacks. While the private sector expressed hesitancy to engage in offensive operations, preferring to focus on defense and resilience, there was an acknowledgment that the current defensive posture alone is insufficient to deter nation-state actors. Speakers suggested a need for strong government-led offensive capabilities to create consequences for attackers, and proposed exploring models for enhanced operational collaboration or deputizing third-party contractors under strict government oversight[ 01:31:16 ]

[ 01:32:55 ] .

Tone of the Meeting

The meeting conveyed an urgent, bipartisan, and collaborative tone, reflecting widespread concern over escalating cyber threats[ 00:23:09 ]

. There was clear frustration with the existing fragmented cyber regulatory landscape and a strong consensus on the need for streamlining and harmonization to re-focus industry efforts on security rather than compliance. Speakers emphasized the critical importance of effective public-private partnerships and the need for high-level government leadership, such as from the White House or the Office of the National Cyber Director, to drive these necessary reforms[ 01:43:48 ] .

Participants

Transcript

?
Unknown
I'd also like to welcome all of our members returning and the new ones that are here.  I'm looking forward to working with all of you and to making this a productive Congress.  As cyber threats to information technology and operational technology increase, we must work hard to ensure cybersecurity is front and center on Congress's agenda.  Until we change our cybersecurity posture, we'll continue to see rogue nation state actors target our nation's critical infrastructure.   In that spirit, I am pleased to give this Congress with a bipartisan priority that is vital to our nation's security, regulatory harmonization.  For too long, we have talked about the cumbersome nature of cyber regulatory regime without seeing the changes necessary to solve it.  In fact, the Biden administration tried to add more regulations on the sector, on sectors such as health care and water.  While it is important for the federal government to work with those sectors that are not as cyber mature, more regulation is not the answer.   With over 50 regulations at the federal level alone, it is time to streamline requirements to ensure they promote useful, actionable, and reasonable information sharing within the timeframe requested.  When organizations face their most vulnerable moment, they should only be thinking about one thing, securing their networks.  Hours of duplicative compliance tasks and hundreds of thousands of dollars invested to navigate the landscape must come to an end.  With the beginning of the new administration, we have an opportunity to reset the regulatory regime once and for all.   In 2022, Congress passed landmark legislation to streamline cyber incident reporting, the Cyber Incident Reporting for Critical Infrastructure Act of 2022, or CIRCIA.  This direct insisted to develop regulations to set an acceptable standard for cyber incident reporting across all 16 critical infrastructure sectors.  Unfortunately, as many of today's witnesses reinforced last year, the scope of the proposed CIRCIA rule went far beyond congressional intent.   Knowing that the deadline for the final rule is approaching, we will dig into the value of SIRCIA and what the future of the rule should look like.  This new administration presents an opportunity to get cyber incident reporting right.