recommended reading

Government Isn't Sharing Cyber Threats As Promised, Private Sector Says


When it comes to cyber threat information sharing, it’s government that’s not holding up its end of the bargain, industry officials told lawmakers Thursday.

Government classification frequently hinders cybersecurity companies’ ability to share information with clients and others in the private sector, effectively giving an adversary a broader playing ground, witnesses told members of the House Homeland Security Committee’s cybersecurity panel.

For example, when the U.S. Navy was breached by Iranian government-linked hackers using a very simple attack vector in 2014, government investigators’ hesitancy to share information may have put private-sector companies in danger of similar attacks, Intel Security Vice President Scott Montgomery said.

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

“By classifying the event, what we’re doing is restricting the number of people who can lend assistance and also allowing the adversary to operate with impunity,” Montgomery said. “If we can release this information sooner, we’re actually affecting not only government, but private-sector organizations that [are vulnerable to] this same very, very common very low-hanging fruit attack.”

That particular attack relied on a common and known cyber exploit industry could easily patch against if it hadn’t already, he said.

Congress passed legislation in 2015 shielding companies from legal liability when they share cyber threat information with the government. The new law has helped ease the path for information to travel in one direction, industry representatives say, but done less in the other direction.  

If government could more readily share threat information—even wiped of much identifying information and in a classified setting with company officials who hold security clearances—it would greatly aid private companies that may face similar threats, said Daniel Nutkis, CEO of HITRUST Alliance, a nonprofit cybersecurity organization for the health care sector.

“The term I can’t stand hearing is ‘active law enforcement investigation,’ which shuts down sharing,” he said. “They’ll reach out, they’ll ask for a whole bunch of stuff or we’ll share a whole bunch of stuff with them and then everything stops. … We’re not sure why they can’t share back. We’re trying to work the same incident they are.”

There are ways in which the government has made improvements, Palo Alto Networks Vice President Ryan Gillis said, especially when multiple federal agencies work on the same private-sector breach.

Such cross-agency responses are common in cyberspace where the Homeland Security Department may be helping a critical infrastructure provider mitigate a particular breach while the FBI seeks information for a possible prosecution and an industry-specific regulator is gathering its own information.

The FBI and Secret Service, which investigates cyber crimes against financial firms, have begun working together more seamlessly when their jurisdictions overlap, Gillis said.

It’s also much less common for different federal agencies to require breached companies and private threat investigators to abide by separate nondisclosure agreements with different requirements, he said.

Threatwatch Alert

Software vulnerability

Malware Has a New Hiding Place: Subtitles

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.