EconPapers    
Economics at your fingertips  
 

Seeking harmony: CISA’s proposed cyber reporting rules for critical infrastructure are an ambitious work in progress

Joseph C. Folio Iii, Alexandra Ross, Ian Wolfe and Nicholas A. Weigel
Additional contact information
Joseph C. Folio Iii: Morrison Foerster, USA
Alexandra Ross: Autodesk, Inc., USA
Ian Wolfe: Autodesk, Inc., USA
Nicholas A. Weigel: Morrison Foerster, USA

Cyber Security: A Peer-Reviewed Journal, 2025, vol. 8, issue 3, 255-263

Abstract: The federal cyber incident reporting regulations proposed by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) are ambitious and laudable but, with some modest changes, could go even farther to protect US critical infrastructure. First, to reduce the growing burden of duplicative and overlapping reporting obligations, CISA should take more concrete steps to harmonise its proposed cyber incident reporting requirements with those of other federal, state and local agencies. Secondly, CISA should provide greater clarity on the types of data that must be preserved following a reportable cyber incident and shorten the default preservation period to six months, with an option to extend it if necessary. Finally, CISA should provide additional guidance about how the reporting requirements apply to the international operations of multinational companies. By offering additional clarity and reducing the burden on private sector entities, CISA could create a streamlined cyber incident report regime that is more closely aligned with the goal of providing timely, essential and actionable information that will better protect the US critical infrastructure.

Keywords: Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA); Cybersecurity and Infrastructure Security Agency (CISA); critical infrastructure; data breach (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/9018/download/ (application/pdf)
https://hstalks.com/article/9018/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:8:i:3:p:255-263

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2025:v:8:i:3:p:255-263