Scoop: Senate HSGAC is working on a bill that combines the House's industry-friendly cyber incident reporting legislation w/ a bunch of programs to tackle ransomware.

Raises Qs about what happens to Warner/Rubio/Collins bill, which industry doesn't like.

subscriber.politicopro.com/article/2021/0…
The big stuff in the HSGAC bill:

* The House Homeland incident reporting legislation, with some tweaks and additions
* "Due diligence requirement" for companies facing ransom demands
* Ransomware task force
* "Ransomware vulnerability warning pilot program"
Due diligence req:

Before paying a ransom, a company would have to determine whether it could recover from the attack “through other means,” including by seeing if experts have published a decryption tool that works for them.

It would have to report to CISA on this process.
Ransomware task force:

DHS and agencies of its choice would get together to coordinate response to ransomware, incl. prioritizing intel collection on ransomware gangs, compiling list of most dangerous groups, and disrupting their infrastructure and finances.
Ransomware vulnerability warning pilot program:

CISA would try to identify the technology most vulnerable to common ransomware techniques & then alert companies using that technology.

If it can't identify them, it can use its new administrative subpoena authority to do so.
DHS would also have to brief Congress on the “defensive measures” that companies can legally take in response to ransomware intrusions and identify any laws that “need to be clarified to enable that action.”
Also, any company that pays a ransom, except for a small business, would also have to submit a report to CISA about the underlying attack, the ransom amount & currency type, & other details.

CISA chooses reporting timeframe, but would have to be b/w 24 & 72 hours after payment.
As I mentioned, the main portion of the bill is the broader cyber incident reporting mandate, which is almost identical to the latest version of the House Homeland bill (homeland.house.gov/imo/media/doc/…), but there are a few additions and changes, which I'll note here...
Some of the changes:

* CISA can't set the cyber incident reporting deadline beyond 7 days after an incident (the floor is 72 hrs)

* Companies don't have to report incidents to CISA if they already report to other agencies & those agencies share with CISA w/in 6 hours
Provisions added to language from House bill:

* CISA has to compare incident reports w/ companies SEC filings
* CISA's pre-reg outreach must include security response firms and cyber insurers
* Pentesting and other VDP-compliant activity excluded from def'n of incident
The new Senate bill would also create a Cybersecurity Incident Reporting Council — CISA, OMB and the Office of the National Cyber Director — to “deconflict” and “harmonize” incident reporting rules, so there's no redundancy in what companies are being asked to do.
It's unclear when Senate Homeland leaders will introduce their bill, but an industry source told me that the committee has asked for industry feedback by 9/14.

House Homeland leaders could also introduce their bill in the coming weeks.
But what does this mean for the Senate Intelligence bill?

As I said, industry doesn't like it —
it allows for a 24-hour reporting deadline, as well as financial penalties for noncompliant companies. (CHS and HSGAC bills only allow for subpoenas.)

Its status is unclear.
Warner's office says they've had productive meetings with stakeholders and are digesting feedback.

But HSGAC has jurisdiction over their bill. So even though Warner, Rubio, and esp. Collins have lots of sway in the Senate, Peters still controls their bill's fate.
When I got this draft, I was talking to industry sources about whether Warner et al. would change their bill after seeing industry feedback at yesterday's House hearing.

Now that may not even matter. Peters could just sweep the SSCI bill aside and focus on his legislation.
If the homeland security panels team up, House Homeland would still need to change its bill, which doesn't include the ransomware stuff in the Senate Homeland bill. But other than that, it would be relatively easy for them to push ahead with their industry-friendly approach.
As usual, at this point, the NDAA is the most likely vehicle for whichever bill wins out. The reconciliation bill would be another option.

But there are some tight timelines here, which means Peters, Warner, etc. will need to huddle and make some decisions soon.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Eric Geller

Eric Geller Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ericgeller

2 Sep
Anne Neuberger, the deputy national security adviser for cyber and emerging technology, is about to speak at the White House press briefing.
Neuberger: "We want to take a moment to encourage organizations to be on guard for malicious cyber activity in advance of the holiday weekend. To be clear, we have no specific threat information or information regarding attacks this weekend, but what we do have is history."
Neuberger notes that history shows that hackers often target companies over holiday weekends, when security operations centers may be understaffed or otherwise unprepared.
Read 13 tweets
1 Sep
The House Homeland Security Committee is about to start a hearing with industry representatives testifying about its draft cyber incident reporting bill.

homeland.house.gov/activities/hea…
As I've noted, the latest draft of the House bill pares back some of the language to accommodate industry concerns. For example, it now says CISA can't require reporting any sooner than 72 hours after an incident.
Industry witnesses will implicitly criticize the Senate bill.

BPI: 24-hr reporting deadline "would distract from critical work" & lead to "premature and likely erroneous" reports homeland.house.gov/imo/media/doc/…

ITI: Limit requirement to "verified" breaches homeland.house.gov/imo/media/doc/…
Read 26 tweets
25 Aug
Embargo has lifted on WH cyber meeting announcements.

* Microsoft: offering $150m worth of security help to govt agencies

* Google: donating $100m to help orgs that secure open-source software

* Amazon: free security tokens for AWS users

* IBM: cyber training for 150k people ImageImageImageImage
Other announcements from these companies:

* Google promising to connect 100k Americans w/ its free IT certificate programs & boost 10m Americans' digital literacy

* Amazon publishing its employee cyber training curricula

* IBM partnering w/ HBCUs on career development
IBM's CEO also called for public companies to formally report on their cybersecurity practices in the same way that many of them currently report on their environmental footprints and social responsibility programs.
Read 8 tweets
25 Aug
"Pool spray" photo op before Biden's cyber meeting with corporate and education leaders is about to start:
Here's what to expect from the meeting, which is really a series of meetings:
Biden: “We've seen time and again how the technologies we rely on, from our cell phones to pipelines to the electric grid, can become targets of hackers and criminals. But at the same time, our skilled cybersecurity workforce is not growing fast enough keep pace.”
Read 6 tweets
25 Aug
Two dozen CEOs and education leaders are meeting with Biden and his natsec team today to discuss ways to improve U.S. cybersecurity.

Expect announcements on critical infrastructure security and workforce development.

We've got a preview here: subscriber.politicopro.com/newsletter/202…
Meeting will start at 2pm and have three phases:

1. Opening discussion with POTUS
2. Three breakout sessions led by senior officials (see next tweet)
3. Concluding discussion led by National Cyber Director Chris Inglis and NSC's Anne Neuberger
Breakouts:

1. Critical infrastructure resilience, led by @SecMayorkas & @SecGranholm, w/ energy, water & financial cos.

2. Building "enduring" cybersecurity, led by @SecRaimondo & @SBAIsabel, w/ tech & insurance cos.

3. Cyber workforce, led by Inglis, w/ education leaders.
Read 4 tweets
19 Aug
💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩💩 ImageImage
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(