In this post, we provide context around CISA, detail what its expiration means for organizations, and offer guidance for how to move forward in the near term.
The CISA legislation was enacted in December 2015 as part of the Consolidated Appropriations Act of 2016. Its primary purpose was to encourage the sharing of cyber threat information between private sector entities and the government by:
CISA can mean one of two things: first, the legislation, passed in 2015; second, the federal agency of the same name, which was founded in 2018. It’s important to clarify that while the legislation has expired, the CISA federal agency continues to operate and will provide cybersecurity services and resources. Here’s what organizations can still access:
Automated Indicator Sharing (AIS): Though the legal liability protections have changed, the technical infrastructure for sharing cyber threat indicators remains operational. Organizations can still participate in the AIS program to receive machine-readable threat intelligence.
Vulnerability Management Resources: The Known Exploited Vulnerabilities (KEV) catalog continues to be maintained and updated. Vulnerability advisories and guidance for remediation remain available, and the coordination of vulnerability disclosures will continue.
Incident Response Support: CISA still provides incident response assistance to federal agencies, critical infrastructure, and state/local governments. The agency will continue to deploy teams to help organizations recover from significant cyber incidents.
Additional Advisory Services: CISA continues to provide comprehensive support for public and private organizations via the National Cybersecurity and Communications Integration Center (NCCIC). Organizations can still leverage CISA’s technical guidance, the “Shields Up” campaign resources, best practice recommendations, and collaborative programs like the Joint Cyber Defense Collaborative (JCDC), all while maintaining access to critical infrastructure partnership frameworks and sector-specific coordination.
From a CISA perspective, the expired legislation means that the statutory liability protections for information sharing through CISA are no longer in effect. Organizations can still engage with CISA for cybersecurity assistance, but may want to add legal checks into their processes prior to information sharing.
It’s important to remember, however, that CISA is not the only source of threat intelligence. While the expiration changes how organizations might use a significant US government-facilitated channel, it does not affect the broader landscape of threat intelligence platforms and data sources. Threat intelligence companies not operating under the CISA 2015 framework continue to offer their services without interruption. Additionally, industry-specific and open-source sharing groups maintain operations and liability protections that are separate from CISA 2015.
For most security teams, CISA was only one of many inputs into a larger threat intelligence ecosystem. The focus now shifts toward re-evaluating that mix of inputs and ensuring that partnerships and practices are aligned with the new legal landscape.
Regardless of whether or not your organization uses CISA as a primary intelligence source, industry shifts such as this often serve as both a catalyst and reminder to revisit best practices.
GuidePoint Security recommends the following actions to strengthen your security posture:
Now is an opportune time to conduct a security architecture review to ensure your systems are designed for resilience, even when threat intelligence might be delayed:
With potential changes to information sharing dynamics, strengthening your independent incident response capabilities becomes even more critical:
By cultivating trusted information-sharing relationships, you can continue gathering and sharing threat intelligence. The following practices will become even more valuable for the foreseeable future:
When threat intelligence might be less readily available, focusing on security fundamentals becomes even more important:
By focusing on these proactive measures, your organization can maintain a strong security posture despite changes to CISA. GuidePoint Security stands ready to help you navigate these challenges through our comprehensive security services.
With the expiration of CISA’s liability protections, organizations face new considerations regarding their cybersecurity risk management approach. This shift makes it more important than ever to evaluate your cyber insurance coverage and legal preparedness.
GuidePoint Security’s comprehensive whitepaper, “Cyber Insurance & Legal Strategy: Mitigating Cyber Risks,” offers valuable insights that complement the strategies outlined in this blog:
Our experts can help you navigate both the technical and legal implications of CISA’s expiration, creating a comprehensive security strategy that addresses both your defensive capabilities and risk transfer mechanisms.
Brent Kelley
Principal Solution Architect,
GuidePoint Security
Brent Kelley is a Principal Solution Architect at GuidePoint Security, holding an M.S. in Cybersecurity Studies from American Military University (AMU). With over two decades of experience and a reputation as a trusted “go-to” leader, Brent specializes in designing and modernizing secure architectures that align with mission priorities and evolving cyber strategies. He develops technology roadmaps, provides strategic guidance across organizational levels, and helps customers maximize existing security investments while advancing toward modern best practices. Brent holds multiple industry certifications and provides global project support across the Defense, Energy, Transportation, and Intelligence sectors.