Can Cyber Threat Intelligence Sharing Continue After CISA 2015’s Lapse?
Can Cyber Threat Intelligence Sharing Continue After CISA 2015’s Lapse?
The expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015 or the Act) on September 30, 2025 has quietly reshaped how organizations should approach cyber threat intelligence sharing. For the past decade, CISA 2015 provided the legal foundation on which many public and private entities relied to collaborate against common cyber threats. CISA 2015 offered key liability protections, authorizations, and confidentiality assurances that were designed to encourage companies share critical threat intelligence without fear of legal exposure.
As companies enter the beginning of a new liability landscape, the fundamental value of sharing cyber threat intelligence has not changed, but the risk calculus has.
CISA 2015 was enacted to strengthen the U.S. cybersecurity posture by promoting timely and robust cyber threat information sharing between the public and private sectors. The Act included important protections for sharing cyber threat indicators and defensive measures, both among private companies and also with government agencies. Under the Act, companies were expressly permitted to monitor their own networks and those of consenting partners, take defensive measures against cyber threats, and share threat indicators with peers and the U.S. government for legitimate cybersecurity purposes, while enjoying statutory safe harbor from civil liability. CISA 2015 also provided antitrust and privilege protections, designed to encourage competitors to exchange threat intelligence without violating competition laws or waiving legal privilege or confidentiality.
With the Act’s expiration, those protections no longer apply, so the potential for legal and reputational risk has increased, particularly for information sharing by and among private sector companies.
Below we highlight potential impacts of the Act’s lapse in three key contexts:
CISA 2015’s lapse revives a dormant tension in cybersecurity policy: how to promote collaboration without creating undue legal risk. Until Congress reauthorizes or replaces the law, organizations will need to navigate this gap carefully. Additionally, any reauthorization may add new terms or limitations on information sharing, so organizations should not assume a duplicate information-sharing framework will be revived in the future.
The bottom line: while it remains permissible to keep sharing cyber threat intelligence, companies that choose to continue information sharing should do so thoughtfully, strategically, and with the guidance of legal counsel.
As with any robust cyber risk management program, cross-functional coordination is key. Security teams should align closely with legal, compliance, and business leaders, as appropriate, to ensure that sharing practices are consistent and advance cyber resiliency objectives while staying within existing legal boundaries. Organizations should also document their sharing rationale, ensure appropriate use of legal privilege where possible, and revisit existing information-sharing agreements to reflect the changed legal landscape. Global organizations should also evaluate cross-border implications of sharing cyber threat intelligence, as differing privacy and data sovereignty laws may impose additional restrictions or disclosure risks irrespective of U.S. data sharing frameworks.
Legally compliant data-sharing strategies can help both sustain industry collaboration and reduce individual exposure, even in a changing regulatory landscape. For now, the challenge lies in maintaining meaningful private and public engagement while ensuring that sharing practices remain defensible under existing law.



