Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

   Ranked #1 Think Tank in U.S. by Global Go To Think Tank Index

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Photo: Adobe Stock
Blog Post - Technology Policy Blog
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

Should Companies Be Required to Share Information About Cyberattacks?

YES: Companies Now Are Flying Blind When Closing Security Gaps

May 22, 2016

Last year, losses or thefts of more than half a billion identities were reported, including the largest data breach in history, involving more than 191 million U.S. voter-registration records.

At the same time, more companies are choosing to keep the scope of the breaches they suffer secret.

Both trends are worrisome, and are likely the tip of the iceberg.

Underreporting of cyberattacks contributes to an incomplete understanding of the magnitude of the threat. It means we are relying on anecdotal information to determine effective defenses against cyberthreats.

Breaches that are disclosed generally involve loss of personally identifiable information or medical records, because reporting of this kind of attack is mandated by state and federal data-breach notification laws.

 

But the laws we have can best be described as a patchwork of requirements inadequate to protect consumers and burdensome for companies. Indeed, state requirements vary in 47 states, and federal rules are inconsistent across sectors and lack specificity. The Securities and Exchange Commission clarified in 2011 that “material” cyberrisks and intrusions must be disclosed to investors. But the SEC didn’t offer formal guidance on what is “material.” Such vagueness means that most public companies file generic statements about cyberrisk and many still don't disclose intrusions at all.

The Cybersecurity Act signed into law in December, as part of a broader spending bill, creates a framework for voluntary sharing of cyberthreat information. This is a significant step, but it, too, doesn't go far enough. Nothing in the law compels companies to disclose incidents or technical details about breaches. There is liability protection against suits resulting from efforts by companies to monitor their own networks and share threat information. But there is no liability protection for companies sued as a result of a breach.

Of course, even if there were liability protection in the case of a breach, companies could still suffer reputational harm by reporting the breach. But the benefits to society by requiring reporting would outweigh the costs to the individual companies. Requiring not only cyber incidents to be reported but the tactics and techniques used by hackers would create greater transparency, allowing businesses, policy makers and consumers to make more informed decisions about how to manage cyberrisk. It would enable decision makers in companies and government to assess risk as well as progress.

 

Not all incidents should be disclosed, and not all the details should be made public. We wouldn't want to give malicious hackers a road map to conduct additional attacks. But major attacks—those that have significant consequences for the economy, public health and safety, or national security—should be disclosed to relevant government agencies and to downstream stakeholders that may be affected by the incident. Disclosure creates incentives for improvement. The alternative is to fly blind when it comes to cybersecurity, which is the approach we use now without much success.

After the congressional and presidential elections in the fall, Congress and the new administration should make a serious effort to overhaul state and federal data-breach-notification laws, harmonize requirements and toughen the standard for data-breach notification.

Congress should also enact new laws to encourage more disclosure of incidents as well as relevant technical details to enable IT vendors and companies to close gaps and vulnerabilities that attackers could use to conduct similar intrusions on others.

This article originally appeared in the Wall Street Journal. 
 

Written By
Denise E. Zheng
Senior Associate (Non-resident), Strategic Technologies Program
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

More from this blog

Blog Post
The Evolving Role of Artificial Intelligence and Machine Learning in US Politics
In Technology Policy Blog
December 21, 2020
Blog Post
No One is Immune: The Spread of Q-anon Through Social Media and the Pandemic
In Technology Policy Blog
December 17, 2020
Blog Post
Assessing the Impact of U.S.-China Technology Competition and Decoupling: Focusing on 5G
In Technology Policy Blog
December 16, 2020
Blog Post
Covid-19 and the Trajectory of US Venture Capital and Technology Innovation
In Technology Policy Blog
December 3, 2020
Blog Post
Managing U.S.-China Technology Competition and Decoupling
In Technology Policy Blog
November 24, 2020
Blog Post
Applications of Synthetic Aperture Radar Satellites to Environmental Monitoring
In Technology Policy Blog
November 9, 2020
Blog Post
The Goldilocks Porridge Problem with Section 230
By Zhanna Malekos Smith
In Technology Policy Blog
November 3, 2020
Blog Post
Notes from a CSIS Virtual Event: Innovation in the Intelligence Community
In Technology Policy Blog
October 20, 2020

Related Content

On Demand Event
Online Event: NASA's Moon to Mars Plan with Administrator Jim Bridenstine
May 5, 2020
On Demand Event
Online Event: The Global Economic Impact of Covid-19 on Women
June 24, 2020
On Demand Event
China's Power: Up for Debate
December 4, 2019
On Demand Event
Online Event: USAID Digital Strategy Launch
April 15, 2020
On Demand Event
Online Event: A Conversation with Ahmed Saeed, Vice President of East Asia, Southeast Asia, and the Pacific at the Asian Development Bank
April 22, 2020
On Demand Event
Online Event: The New International Economy
June 1, 2020
Congressional Testimony
U.S. Coast Guard cooperation with Southeast Asia: Maritime Challenges and Strategic Opportunities
Statement by Amy Searight
March 10, 2020
On Demand Event
Online Event: Schieffer Series: A Conversation with Senator Mitt Romney on U.S.-China Relations and Great Power Competition
July 21, 2020
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2020. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions