The Cybersecurity Information Sharing Act of 2015 (CISA 2015), the legal foundation for public-private cybersecurity threat intelligence sharing in the United States, is set to expire on January 30, 2026. Despite broad bipartisan support for permanent reauthorization, political obstacles have left the law’s future uncertain.

Current status

AttributeStatus
Current extension expiresJanuary 30, 2026
Bipartisan supportYes (both chambers)
White House positionSupports 10-year reauthorization
Primary obstacleSen. Rand Paul (R-KY)
Reason for obstructionUnrelated CISA agency concerns

Timeline

DateEvent
December 2015CISA 2015 enacted with 10-year authorization
September 30, 2025Original authorization expires
October 1, 2025Law lapses; sharing continues under legal uncertainty
October 1 - November 12, 2025Law lapsed (43-day gap)
November 12, 2025Temporary extension passed in government funding bill
January 30, 2026Current extension expires

What CISA 2015 does

The law established a framework for voluntary cybersecurity information sharing between private companies, the federal government, and among private entities:

Core protections

ProtectionPurposeImpact
Liability shieldCompanies sharing threat data in good faith are protected from lawsuitsRemoves legal risk for sharing
Antitrust exemptionCompetitors can collaborate on defense without antitrust concernsEnables industry cooperation
FOIA exemptionShared threat indicators exempt from public disclosure requestsProtects sensitive information
Privacy safeguardsRequires scrubbing personal information from shared indicatorsBalances privacy concerns
Bidirectional sharingEnables government-to-private-sector threat intelligence flowComplete information sharing

How sharing works

DirectionMechanismBenefit
Private → GovernmentAutomated indicator sharing (AIS)Government gets private sector visibility
Government → PrivateThreat briefings, alertsPrivate sector gets classified context
Private → PrivateISACs, direct sharingPeer-to-peer defense collaboration

Why it matters

CISA 2015’s protections underpin much of the US cybersecurity ecosystem:

Information Sharing and Analysis Centers (ISACs)

ISACSector
FS-ISACFinancial Services
Health-ISACHealthcare
E-ISACEnergy/Electricity
IT-ISACInformation Technology
WaterISACWater and Wastewater
MS-ISACState/Local Government
Aviation ISACAviation

These organizations rely on CISA 2015’s framework to facilitate rapid threat intelligence sharing among members and with government agencies.

Incident response impact

CISA 2015’s mechanisms were cited as instrumental in responding to:

IncidentCISA 2015 role
SolarWinds supply chain compromiseCross-sector coordination
Ongoing Chinese APT campaignsIndicator sharing
Critical infrastructure threatsGovernment-industry collaboration
Ransomware campaignsPrivate sector intelligence pooling

Reauthorization efforts

Both chambers of Congress have advanced bills for permanent reauthorization:

House bill

AttributeDetails
BillH.R. 5079
NameWIMWIG Act (Widespread Information Management for the Welfare of Infrastructure and Government)
SponsorRep. Andrew Garbarino (R-NY), House Homeland Security Committee
Duration10 years
StatusPassed committee September 2025
AI provisionsUpdates definitions to account for AI advances

Senate bill

AttributeDetails
BillS. 1337
SponsorsSen. Gary Peters (D-MI), Sen. Mike Rounds (R-SD)
Duration10 years
StatusIntroduced October 2025
BipartisanYes

Both bills have bipartisan support. The White House also supports reauthorization.

Political obstacles

Sen. Rand Paul (R-KY) chairs the Senate committee with jurisdiction over CISA 2015 and has blocked consideration of clean reauthorization bills.

Paul’s concerns

ConcernTargetRelationship to CISA 2015
Misinformation workCISA agency (not the law)Unrelated
Free speech concernsCISA agency programsUnrelated
Government overreachAgency activitiesUnrelated

Paul’s concerns relate to the CISA agency (Cybersecurity and Infrastructure Security Agency)—not CISA 2015 the law. He objects to CISA’s previous efforts to combat online misinformation and has demanded changes including:

DemandImpact on effectiveness
Remove FOIA protectionsReduces sharing incentives
Remove federal preemptionCreates state-by-state complexity
Change threat indicator definitionsNarrows scope
Limit to 2-year reauthorizationCreates ongoing uncertainty
Prohibit misinformation workUnrelated to information sharing

Critics argue these changes would undermine the law’s effectiveness by reducing incentives for private sector participation.

What expiration means

If CISA 2015 fully lapses:

ImpactConsequence
Liability uncertaintyCorporate counsel may advise against sharing
Reduced sharing volumeFewer threat indicators flow to government
ISAC disruptionFramework supporting ISACs undermined
Slower incident responseCross-sector coordination becomes legally uncertain
Competitive concernsAntitrust exemption loss affects collaborative defense
FOIA exposureShared indicators could be subject to disclosure

Many companies would likely continue sharing under other legal frameworks, but explicit protections matter for corporate decision-making and legal risk management.

Without CISA 2015Risk
Sharing threat indicatorsPotential liability exposure
Coordinating with competitorsAntitrust concerns
Responding to government requestsLegal uncertainty
Operating ISACsFramework gaps

Industry response

Cybersecurity industry groups and ISACs have urged immediate action:

Industry coalition statements

“The law’s expiration comes at a particularly dangerous time given the escalating frequency and sophistication of state-sponsored cyber operations targeting US critical infrastructure.”

Organizations lobbying for reauthorization include:

OrganizationSector
IT-ISACInformation Technology
FS-ISACFinancial Services
US Chamber of CommerceBusiness
Major technology companiesTechnology
Critical infrastructure operatorsMultiple

What happens next

Possible outcomes

OutcomeLikelihoodImpact
Another short-term extensionHighKicked to next continuing resolution
Compromise billMediumNegotiated changes to address Paul’s concerns
Full expirationLowLaw lapses; sharing under legal uncertainty
Clean 10-year reauthorizationLowRequires overcoming Senate obstruction

Recommendations

For organizations sharing threat intelligence

PriorityAction
HighContinue sharing under existing frameworks
HighDocument good-faith basis for sharing activities
HighConsult legal counsel on risk posture during uncertainty
MediumMonitor legislative developments
OngoingEngage with ISACs on policy advocacy

For policy makers

PriorityAction
CriticalSeparate CISA 2015 from CISA agency disputes
HighPass clean reauthorization
MediumConsider bipartisan compromise path
OngoingRecognize information sharing as critical infrastructure

Context

The legislative dysfunction around CISA 2015 illustrates how cybersecurity policy can become entangled with broader political conflicts. The law itself has bipartisan support; the obstacle is unrelated grievances about the CISA agency’s non-cybersecurity activities.

CISA 2015 is widely regarded as one of the most effective cybersecurity laws of the past decade. Allowing political disputes over an unrelated agency to undermine critical infrastructure protection creates unnecessary risk at a time when state-sponsored cyber threats are escalating.

The October 2025 lapse

The 43-day gap between September 30 and November 12, 2025 created significant legal uncertainty:

Impact during lapseAssessment
Sharing continuedMost organizations continued sharing
Legal exposureTheoretical liability risk increased
Industry anxietyCorporate counsel raised concerns
ISACsOperated under existing frameworks
Government sharingContinued via other authorities

While no enforcement actions or lawsuits resulted from the lapse, the legal ambiguity caused concern among risk-averse organizations.

Morrison Foerster and other law firms advised that cyber threat intelligence sharing could continue during the lapse:

FrameworkAvailability
CISA 2015 protectionsLapsed/restored
Common law defensesAvailable
Other federal sharing programsContinued
Private-to-private sharingGenerally permitted
ISAC frameworksContractual protections

Organizations should consult legal counsel on their specific risk posture as the January 30, 2026 deadline approaches.

Industry advocacy

Multiple industry groups have actively lobbied for permanent reauthorization:

OrganizationAdvocacy position
IT-ISACPermanent reauthorization
FS-ISAC10-year extension
US Chamber of CommerceClean reauthorization
Critical Infrastructure OperatorsBipartisan support
Major Technology CompaniesRemove uncertainty

The unified industry position underscores the law’s importance to the cybersecurity ecosystem.

Organizations should prepare for continued uncertainty while hoping Congress finds a path to permanent reauthorization. The threat landscape doesn’t pause for political disputes.