Health-ISAC Hacking Healthcare 2-19-2025

This week, Health-ISAC®‘s Hacking Healthcare® examines one of the United States’ foundational cyber information sharing laws. Join us as we explain what the Cybersecurity Information Sharing Act of 2015 is and why it is so important. Then, in our Action & Analysis section, we break down what a lack of reauthorization might mean for entities that rely on it to facilitate cyber information sharing and how Health-ISAC organizations can help support efforts to ensure it is reauthorized.
As a reminder, this is the public version of the Hacking Healthcare blog. For additional in-depth analysis and opinion, become a member of H-ISAC and receive the TLP Amber version of this blog (available in the Member Portal.)
PDF: TLP WHITE Hacking Healthcare 2.19.2025
Size : 284.7 kB Format : PDF
Text Version:
Welcome back to Hacking Healthcare®.
CISA 2015 Reauthorization
It is widely acknowledged that cyber information sharing provides enormous benefits for participants and that it is a critical component of keeping networks and infrastructure safe. While the public and private sectors have room for further improvement, a significant factor in cyber information sharing within the United States reaching the level of maturity it is at today is thanks to the Cybersecurity Information Sharing Act of 2015 (CISA 2015). Unfortunately, the framework and protections that it provides may not be around much longer.
What Is CISA 2015?
Passed into law in late 2015, CISA 2015 was a bipartisan proposal that sought to encourage voluntary cyber information sharing between the government and the private sector and within the private sector itself. Included in the final law were provisions that:[i]
- Defined terms like “cybersecurity threat,” “cyber threat indicator,” “defensive measure,” and “information system” – Sec. 102
- Instructed federal government entities to develop the means to facilitate and promote the “timely sharing” of threat indicators, defensive measures, and information relating to cybersecurity threats and outlined conditions for sharing with federal entities, non-federal entities, and the general public – Sec. 103
- Provided authorizations, with exceptions, for non-federal entities to share or receive information with non-federal entities or the government. – Sec. 104
And critically:
- Provided relatively extensive liability protections to entities acting within the bounds of CISA 2015, as well as enough privacy and civil liberties protections to mitigate concerned groups – Sec. 106
All of these elements combined to create a framework that signaled intent from the federal government that voluntary cyber information sharing was a practice that should be embraced. The Cybersecurity and Infrastructure Security Agency (CISA) has utilized CISA 2015 as a foundation for many of its information-sharing programs and processes. Former CISA Executive Director Brandon Wales relayed as much at a January Congressional hearing by stating that “This Act is an important tool to facilitate the flow of critical cyber intelligence between industry and government, and letting it expire would be a huge step back.”[ii]
So, what is the reauthorization issue?
What Is Reauthorization?
Within the United States, not all laws exist in perpetuity. It isn’t uncommon for proposed laws and regulations to include a “sunset provision,” which outlines a date by which the enacted law would cease to be effective, barring some additional action to extend or “reauthorize” it.
There are a variety of reasons why a proposed legislation or regulation might be introduced with a “sunset provision.” It might be believed that the issue being addressed is time sensitive, or it might be that it is unclear just how a law or regulation might work in practice, and a sunset provision can help act as a backstop for unintended consequences, or it may help ensure that a created government program doesn’t go funded and staffed forever regardless of its continued usefulness.
Regardless of why CISA 2015 has a sunset provision, although it is likely related to the complicated nature of its development and the negotiations and compromises that were required to get it into law, CISA 2015 is currently set to sunset on September 30, 2025.
If Congress does not take action to replace or reauthorize CISA 2015 before that date, the law will lapse, and the framework and protections outlined within it will no longer be effective.
Action & Analysis
**Included with Health-ISAC Membership**
[i]https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20Information%20Sharing%20Act%20of%202015.pdf
[ii]https://insidecybersecurity.com/daily-news/it-info-sharing-leader-emphasizes-importance-reauthorizing-cisa-2015-law-industry-players
[iii]https://www.cisa.gov/sites/default/files/2024-04/NonFederal-Entity-Sharing-Guidance-April-2024-Update.pdf
- Related Resources & News
- Healthcare Heartbeat 2024 Q4
- Podcast: Reflecting on the Change Healthcare cyberattack
- Senate Confirms Trump Pick RFK Jr. to Lead HHS
- The Alarming Backdoor Hiding in 2 Chinese Patient Monitors
- Health-ISAC 2025 Health Sector Cyber Threat Landscape
- How Health Systems Manage Security in the Cloud
- Change Healthcare Attack a Wake-up Call for the Industry
- Five High-Impact Cyberattacks Healthcare Industry Should Avoid in 2025
- Health-ISAC Hacking Healthcare 2-11-2025
- 4 healthcare tech trends to watch in 2025