UnitedHealth CEO Andrew Witty faced the Senate and House on May 1 to present testimony regarding the recent Change Healthcare cyberattack. This attack, which occurred in February, impacted millions of Americans and accrued costs totaling nearly $1 billion. In response to this breach, Witty pledged to rectify critical security weaknesses, such as the lack of multifactor authentication on the Change Healthcare portal. Additionally, he expressed UnitedHealth’s support for the implementation of standardized and nationalized cybersecurity event reporting to enhance the country’s cybersecurity infrastructure.
The idea of standardized cybersecurity event reporting received general acceptance, considering the multitude of existing cyber-incident reporting regulations worldwide. However, the key question remains: is this proposal feasible in practice? Companies are already subject to a wide array of regulatory and reporting standards based on their operations and data handling practices. These regulations range from the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) and the General Data Protection Regulation (GDPR) in the EU to rules set by the Security and Exchange Commission and the Health Insurance Portability and Accountability Act (HIPAA), among others. With over 200 potentially applicable regulations, many with stringent reporting deadlines and penalties for non-compliance, navigating this regulatory landscape can be complex and challenging for organizations.
In light of this regulatory complexity, there is a growing need for a centralized reporting mechanism for cyber incidents. The Department of Homeland Security (DHS) recommended the establishment of a single portal for streamlined reporting and information sharing in its September 2023 report, “Harmonization of Cyber Incident Reporting to the Federal Government.” This centralized reporting location could serve as a nexus for transmitting incident information to various regulatory bodies, simplifying the reporting process for companies and promoting regulatory compliance.
The National Cyber Incident Response Plan (NCIRP), mandated by the Biden administration’s National Cybersecurity Strategy, offers a potential solution for centralizing cyber incident reporting. CISA is updating the NCIRP to address evolving cybersecurity threats and foster collaboration between government entities, private sector organizations, regulators, and other stakeholders. The plan’s principles include unification, shared responsibility, learning from past incidents, and keeping pace with cybersecurity advancements, emphasizing proactive measures and agility in responding to cyber threats.
Companies play a crucial role in enhancing cybersecurity resilience by implementing robust cybersecurity response and reporting programs that prioritize transparency and accountability. Traditional approaches that prioritize secrecy and minimal documentation of incidents are no longer sustainable in the current regulatory environment. Companies must embrace transparency, develop comprehensive incident response plans, and focus on operationalizing their responses to ensure timely and effective incident management.
By fostering transparency, collaboration, and robust reporting practices, companies can meet their shared responsibilities, comply with regulatory requirements, and enhance overall cybersecurity posture. A unified reporting system with a central reporting location can facilitate information sharing, collaboration, and improved security across the industry. As the cybersecurity landscape continues to evolve, a centralized reporting mechanism will be essential for a cohesive and effective national cybersecurity strategy.
_Tero_Vesalainen_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop)