NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Realize the Full Value of Microsoft Security
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • ARC-AMPE Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • SOC as a Service
      • Microsoft Security Managed Services
      • Splunk Managed Services
      • Tenable Managed Services
      • CrowdStrike Managed Detection and Response (MDR)
      • Zscaler Support Services
      • Vendor Security Assessments
      • Curated Threat Intelligence
      • Vulnerability Management
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Downloadable Assets icon Downloadable Assets
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Guide Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Defining Whole-of-State Security: Building Resilient States Through Unified Cybersecurity
    Read Guide
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Industry Insights
    • Security Operations
    • Cybersecurity Technology
    • Advisory and Planning
    • Security Testing
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • Managed Services
    • NuHarbor
    • Cyber Talent
October 30, 2025

Securing State Systems After the Information-Sharing Law Lapses

Justin Fimlaid Justin Fimlaid
Securing State Systems After the Information-Sharing Law Lapses

For a decade, the Cybersecurity Information Sharing Act of 2015 was the public sector’s neighborhood watch—with rules, radios, and a legal charter. When one agency spotted a malicious IP, hash, or tactic, others heard about it quickly. The law did the heavy lifting: liability protections, FOIA/state-records carve-outs, and clear guidance that made sharing routine instead of risky. 

That charter has lapsed. The networks are still there; the radios work. But now every transmission gets a legal second look. Counsel asks whether sharing could waive privilege or trigger disclosure. Analysts hesitate. Indicators take longer to move. The net effect isn’t dramatic theater. It’s a little more friction, a little less signal, and more time for adversaries. 

Why should a state leader care? Because CISA 2015 was plumbing, not politics. It sped federal-to-state alerts, enabled automated feeds (AIS), and gave ISAC channels cover to move faster. In practical terms: your SOC could block what a neighboring jurisdiction saw an hour earlier; your counsel could green-light participation without antitrust anxiety; your CIO could make sharing standard operating procedure. 

Remove that legal scaffolding and the same technical act—posting a malicious domain, shipping a sensor hit—feels heavier. No panic, but fewer clean passes across the field. In state government, where staff and time are tight, the difference between “share now” and “share after review” is often the difference between containment and cleanup. 

Why CISA Made Sharing Possible 

Information sharing in cybersecurity has always been a paradox; everyone says it’s essential, but few want to be the first to share. Before 2015, companies and agencies were wary—worried about lawsuits, FOIA requests, or regulators asking why sensitive logs were released. The result was a culture of hesitation. 

CISA 2015 shifted that dynamic. It offered something simple but powerful, safe harbor. Share an indicator of compromise, and you wouldn’t face antitrust claims for coordinating with peers. Strip personal data and follow the rules, and you wouldn’t risk breaching privacy laws. Information given to DHS or an ISAC couldn’t be pried open by public-records requests. In short, the law lowered the professional anxiety that kept threat intel locked away. 

That legal certainty mattered more than most realized. It turned “maybe later” into “let’s push it now.” It gave legal teams a green light instead of a red flag. And once the first few agencies and companies started contributing, the network effect kicked in. Indicators from banks flowed into MS-ISAC, ransomware signatures surfaced in K-12 feeds, and state networks began blocking domains seen by universities halfway across the country. 

The lesson: good cybersecurity wasn’t just about firewalls and feeds. It was about trust. CISA gave leaders the assurance that trust had a legal backbone, and that made sharing the default instead of the exception. 

Sure, participants were sometimes hesitant to share and would only lurch intelligence but the concept is there, the system gets smarter if participants share what they see. 

What CISA Did for Public Sector Leaders 

For state and higher-ed leaders, CISA wasn’t abstract legislation, it was infrastructure that shaped daily defense. Here’s how it showed up in practice: 

  • Faster federal signal. CISA required agencies like DHS and FBI to push out indicators quickly. That meant your SOC could see the same malicious IP that just hit a telecom carrier or federal contractor, without waiting for a news cycle. 
  • ISAC channels with teeth. Multi-State ISAC alerts, REN-ISAC bulletins for universities, and Election ISAC advisories all carried the weight of federal sharing authority. Local governments and campuses that couldn’t afford their own intel teams suddenly had access to threat feeds backed by national resources. 
  • Legal cover for collaboration. General counsels in state agencies stopped balking at information-sharing agreements. Liability protections and FOIA carve-outs made it safe to participate without worrying that a well-intentioned alert would spark lawsuits or disclosures. 
  • Operational efficiency. Sharing through CISA-enabled pipelines meant one jurisdiction’s detection could turn into another’s prevention. A phishing lure seen in a rural county could be blocked in a state health department inbox the same day. 
  • Defensive experimentation. The law also sanctioned “defensive measures”—things like sinkholing malicious domains—without agencies wondering if they were tiptoeing over legal lines. 

Taken together, CISA made threat sharing less about favors and more about process. For public sector leaders, it was the difference between relying on luck and relying on a system that gave everyone a little more visibility and a little more time to respond. 

It’s Sunset for Now, But Is It Really Dead? 

Officially, the Cybersecurity Information Sharing Act of 2015 expired with the federal budget clock. In reality, the infrastructure it built hasn’t disappeared—it’s just operating without its charter. The programs it empowered, like the Automated Indicator Sharing (AIS) platform and the ISAC networks, still exist. The data still flows. What’s missing is the legal backbone that made it safe and easy to participate. 

Congress has been here before. Few laws in cybersecurity die cleanly; they linger in continuing resolutions, political horse-trading, or temporary extensions. Several bipartisan efforts to reauthorize CISA are on the table, some for 10 years, some for two, each with its own set of privacy revisions and political sticking points. For now, it’s a holding pattern—nobody wants to rebuild the watch from scratch, but not everyone agrees on how it should look next. 

So, is it dead? Not yet. But it’s unprotected. The longer it stays in limbo, the more likely risk managers will start pulling back, lawyers will tighten the guardrails, and public-sector partners will share less freely. The spirit of collaboration hasn’t vanished; it’s just back to operating on good faith rather than firm ground. And in cybersecurity, good faith doesn’t stand up well in court. 

What Comes Next: A Fragmented Threat Landscape 

Without CISA’s legal and procedural scaffolding, the national threat-sharing network starts to look more like a patchwork quilt than a single fabric. Federal agencies still publish alerts, but they arrive slower and with fewer technical details. ISACs continue to coordinate, but participation drops as risk officers question every disclosure. The seamless loop of “detect-share-defend” starts to fray at the edges. 

This fragmentation has real consequences. Smaller agencies and school systems—already strapped for staff—lose the benefit of crowd-sourced early warning. The same phishing kit or ransomware strain may now hit ten different jurisdictions before anyone realizes it’s the same campaign. Analysts spend more time verifying indicators and less time defending networks. 

Threat actors, meanwhile, don’t share our hesitation. Criminal syndicates and nation-states exchange tooling, infrastructure, and tactics with remarkable efficiency. When defenders pause to check with legal, attackers keep moving. The asymmetry grows wider. 

The post-CISA world risks becoming one of uneven visibility, where large, well-resourced organizations maintain their own intel pipelines, while smaller agencies operate blind. It’s not that information sharing stops; it just becomes selective, inconsistent, and slower. In cybersecurity terms, that’s fragmentation—and fragmentation is what adversaries count on.

Recommendations for Public Sector CISOs 

  1. Keep sharing but be deliberate. The legal safety net may be gone, but the mission hasn’t changed. Work through trusted intermediaries such as your fusion center. Use anonymized, sanitized indicators where possible, even sanitized public information can be helpful, and document your decision processes to show reasonable care if questions arise. 
  2. Tighten internal legal alignment. Don’t let legal caution become operational paralysis. Sit down with counsel now to redefine your agency’s comfort zone for sharing threat data. Establish clear internal policies for what can be shared, how, and with whom. The gray area is only risky if it’s undefined. 
  3. Reinforce peer networks. Reconnect with neighboring states, and regional partners. Formal federal frameworks may be on pause, but state-to-state collaboration can fill the gap. Consider lightweight MOUs or Slack-style trusted channels among peer agencies to maintain fast communication. 
  4. Invest in collection and correlation. As federal feeds slow, prioritize your own visibility. Strengthen your SIEM’s correlation logic and integrate with any remaining automated feeds. Treat local telemetry as your first-party intelligence—your own “mini-ISAC.” 
  5. Plan for legal reinstatement...or not. Build policies that can flex if CISA returns or a new law replaces it. Assume a future where information sharing remains voluntary but more complex. Document your rationale for decisions now so you’re not rewriting governance later under pressure. 
  6. Train analysts to think contextually. Encourage teams to look for relationships between local detections and national trends, even without formal data pipelines. A strong analyst culture is the best hedge against losing automated intelligence flow. 

CISOs can’t legislate the law back into existence, but they can design around its absence. The goal isn’t to replicate CISA, it’s to keep the collaborative instinct alive until Washington catches up. 

Holding the Line 

The expiration of CISA 2015 isn’t a catastrophe; it’s a stress test. The best programs will keep sharing, keep coordinating, and keep defending, but they’ll do it with a little less certainty and a little more friction. The real risk isn’t legal, it’s cultural. If teams start retreating into isolation, the collective awareness that made state and higher-ed networks stronger will erode quietly, one unshared alert at a time. 

Cyber defense has always been a team sport played on uneven ground. CISA 2015 evened it out for a while, giving public-sector defenders the confidence to act like a single, coordinated enterprise. Its sunset doesn’t erase that muscle memory, but it does mean leaders will need to protect it deliberately. 

Whether Congress restores the legal framework or replaces it with something new, the principle remains: security improves when information moves faster than attackers do. Until the federal radios come back online, the neighborhood watch isn’t gone, it’s just back to handwritten notes and front-porch coordination. The mission stays the same: keep the lights on, keep talking, and don’t let the silence become normal. 

If you need help tackling the mission, reach out to the NuHarbor team.


Don't miss another article. Subscribe to our blog now. 

Subscribe now

 

Included Topics

  • Industry Insights,
  • Advisory and Planning,
  • Security Operations
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Compliance 1 min read
MARS-E 2.0: Key Dates for Compliance Read More
Industry Insights 4 min read
What the Federal Courts Breach Means for Public Sector Cybersecurity
What the Federal Courts Breach Means for Public Sector Cybersecurity
Read More
Advisory and Planning 4 min read
A New Model for Statewide Cybersecurity Workforce Development
A New Model for Statewide Cybersecurity Workforce Development
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.