IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Preparing K-12 and higher education IT leaders for the exponential era

Schools Face Uncertainty as Cybersecurity Info-Sharing Law Nears Sunset

As the Cybersecurity Information Sharing Act nears expiration, experts warn K-12 schools could face heightened cyber risks without it, while the House and Senate weigh approaches to renewing the law.

A gavel and a set of brass scales with lines of code behind them in green against a dark background.
Adobe Stock/bots2112
At the end of September, legislation that unified an approach to cybersecurity across government agencies and private industry is scheduled to sunset, leaving K-12 schools, which have become a primary target for cyber attacks, in a potentially more vulnerable place. The Cybersecurity Information Sharing Act of 2015 established a framework for government agencies, including public schools, and private entities to share warnings about hackers, malware and other digital threats, with legal protections to encourage cooperation.

Education has become a prime target industry for cyber criminals. According to the U.S. Department of Education, school districts nationwide experience five cybersecurity incidents per week, on average. Yet according to the Consortium for School Networking (CoSN), only 1 in 3 U.S. school districts has even one full-time cybersecurity staff member, leaving the majority of districts to rely on outside help or shared services. The act, abbreviated as CISA 2015, not to be confused with the federal agency of the same acronym, has helped fill some of those needs.

“They will essentially lose the advantage of getting things like threat notifications and coordinated systems,” Amy McLaughlin, project director for cybersecurity and network and systems design initiatives at CoSN, said. “They will be struggling along the way they were before 2015, but with a much broader threat environment because we are much more highly dependent on technology than we were 10 years ago, and the threat actors have gotten more and more clever.”
They will be struggling along the way they were before 2015, but with a much broader threat environment because we are much more highly dependent on technology than we were 10 years ago, and the threat actors have gotten more and more clever.
Amy McLaughlin, project director for cybersecurity and network and systems design initiatives, CoSN

ABOUT THE ACT


Congress originally passed CISA 2015 in the wake of breaches like the Office of Personnel Management hack and growing calls for better collaboration on cyber defense. The act created a voluntary system for sharing cyber “indicators” — including malicious websites, new techniques or threat activity among known bad actors — between federal agencies, state and local governments and companies. It directed federal agencies to rapidly distribute information in both classified and unclassified forms to relevant parties.

It also explicitly authorized private firms to monitor their own networks and those of contracted client partners and to share cyber threat information with each other and the government without risk of breach of privacy and antitrust rules. Information shared under the act is exempt from public disclosure requests, keeping sensitive security details private.

The act also enshrined standards for sharing the information, including requiring that personally identifiable information be removed, and tasked federal agencies like the Department of Homeland Security (DHS) and the Department of Justice with guiding participants on protecting civil liberties in the sharing process.

In practice, CISA 2015 led to the development of the DHS Automated Indicator Sharing system, which allows real-time exchange of threat alerts from one machine to another. It also bolstered the role of sector-based Information Sharing and Analysis Centers (ISACs) that funnel threat bulletins to members in specific sectors. The Multi-State ISAC, for example, shares across state governments, while the Research and Education Network ISAC shares across education and research institutions.

Over the past decade, the law has become an important piece of U.S. cyber defenses.

“A significant volume of critical cyber threat intelligence has been exchanged between industry and government under this law,” Rep. Andrew Garbarino, R-N.Y., who chairs a House cybersecurity subcommittee, said in a May hearing.

For example, he said, one major organization shared 84 threat reports in a year, reaching thousands of partners and helping to foster a landscape where information sharing is the norm rather than the exception.

WHY SCHOOLS HAVE A STAKE


The education sector has benefited from this collaborative model, receiving threat advisories through various ISACs, McLaughlin said. Carla Wade, who oversees corporate sponsorship, professional learning and advocacy programs at CoSN, said public schools hold a trove of sensitive student and staff data and often rely on these warning systems in the absence of dedicated cybersecurity personnel.

Both federal officials and school IT experts caution that if the act sunsets on Sept. 30, it could weaken defenses.

“Letting it expire de facto indicates that there is no longer a problem, which is not an accurate assessment or state at all,” McLaughlin said.

In reality, attacks on education continue to climb. According to tech research firm Comparitech, ransomware attacks on the education sector jumped 23 percent in the first half of 2025 compared to the same period in 2024.

Without the legal protections in CISA 2015, private-sector members may be less willing to share cybersecurity information with other companies or public agencies, Garbarino said in the hearing.

The sunset may also diminish resources for ISACs, making it harder to share information, even if organizations want to. A recent $10 million cut to the Multi-State ISAC is one example of potential losses.

“Having that coordinated effort where people know where the information came from, that it’s been vetted and reviewed, and that it’s from a trusted source is really important because there’s no good way to just randomly share information across multiple organizations without a coordinating entity,” McLaughlin said.

CALLS FOR EXTENSION


Lawmakers in the House and Senate; industry groups in banking, power and cybersecurity; and the U.S. Chamber of Commerce have all called for the extension of the act, which is permissible under the law with congressional approval.

A Senate measure introduced in April by Sen. Mike Rounds, R-S.D., and Sen. Gary Peters, D-Mich., would simply renew the law through 2035 without substantive changes. In the House, a parallel effort is underway, with committees weighing reauthorization. Lawmakers have also discussed attaching some refinements to reflect evolving threats and technology, including artificial intelligence.

“While I recognize that there is room to improve and modernize the Cybersecurity Information Sharing Act, we cannot allow efforts to rethink the bill to interfere with its timely reauthorization,” Rep. Bennie Thompson, D-Miss., the ranking member on the Homeland Security Committee, said in a public statement. “If history is any guide, changes to CISA 2015 — however minor — will involve multiple stakeholders and multiple rounds of careful negotiation.”
Abby Sourwine is a staff writer for the Center for Digital Education. She has a bachelor's degree in journalism from the University of Oregon and worked in local news before joining the e.Republic team. She is currently located in San Diego, California.