{"id":51170,"date":"2023-03-24T16:08:48","date_gmt":"2023-03-24T16:08:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34460\/House-Leaders-Dont-Want-CISAs-Reach-To-Exceed-Its-Grasp.html"},"modified":"2023-03-24T16:08:48","modified_gmt":"2023-03-24T16:08:48","slug":"house-leaders-dont-want-cisas-reach-to-exceed-its-grasp","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/","title":{"rendered":"House Leaders Don&#8217;t Want CISA&#8217;s Reach To Exceed Its Grasp"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/030223_cisa.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>As the Cybersecurity and Infrastructure Security Agency\u2019s mission and portfolio have grown in recent years to meet the bold agendas of Congress and the White House, leaders on the House Homeland Security Committee want to ensure that as the young agency is given new powers and increased funding, it is adequately staffed and resourced to handle existing responsibilities.<\/p>\n<p>First created through legislation passed during the Trump administration, CISA began with a budget of $1.68 billion. Since then, it has experienced a meteoric rise as the top cyber agency for the civilian federal government and one of the government\u2019s chief coordinators with the private sector. As a result, the dollars flowing into the agency have nearly doubled to $2.9 billion in 2023, with the latest White House spending plan proposing an additional increase to $3.1 billion as CISA has taken on a range of new authorities, responsibilities and initiatives.<\/p>\n<p>Those actions include the establishment of the Joint Cyber Defense Collaborative, <a href=\"https:\/\/www.dhs.gov\/news\/2022\/09\/16\/biden-harris-administration-announces-1-billion-funding-first-ever-state-and-local\">doling out<\/a> hundreds of millions of dollars in grant funding to state and local governments, and new regulatory authorities to issue <a href=\"https:\/\/www.google.com\/search?q=sc+media+derek+b.+johnson+cisa+administrative+subpoena&amp;sxsrf=AJOqlzUerIx6w0SDDF8yj0hgyxsQrtckUQ%3A1679605588410&amp;source=hp&amp;ei=VL8cZLesFuOe5NoPj_y_4AI&amp;iflsig=AK50M_UAAAAAZBzNZC9_tI78UOskL6XSnTOn_xIPhsWu&amp;ved=0ahUKEwi3ptSz-vL9AhVjD1kFHQ_-DywQ4dUDCAo&amp;uact=5&amp;oq=sc+media+derek+b.+johnson+cisa+administrative+subpoena&amp;gs_lcp=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&amp;sclient=gws-wiz\">administrative subpoenas<\/a> to industry, require critical infrastructure entities to <a href=\"https:\/\/www.scmagazine.com\/analysis\/incident-response\/cisa-puts-out-the-call-for-public-feedback-on-new-incident-reporting-rules\">report cyberattacks<\/a>, and <a href=\"https:\/\/www.scmagazine.com\/podcast-segment\/trickle-down-effects-from-threat-hunting-on-federal-networks-michael-daniel-rsa22-2\">proactively threat hunt<\/a> on other federal agency networks. The agency also continues to staff up in the midst of a nationwide shortage of cybersecurity workers, while Director Jen Easterly <a href=\"https:\/\/www.scmagazine.com\/analysis\/policy\/white-house-calls-for-11-bump-in-civilian-cyber-budgets\">is looking to achieve gender parity<\/a> in the agency\u2019s workforce by 2030.<\/p>\n<p>In the first hearing of House Homeland\u2019s Cyber and Infrastructure Protection Subcommittee this Congress, leadership from both parties indicated they intend to focus on ensuring the agency is appropriately structured and resourced to carry out its increased writ. Rep. Andrew Garbarino, R-N.Y., chair of the subcommittee, promised \u201crigorous oversight\u201d of the agency\u2019s expanded mission, saying \u201cthe level of funding and responsibilities CISA has taken on in recent years \u201cwould be a lot for even a large, mature department to handle.\u201d<\/p>\n<p>\u201cAs a result of the evolving threat landscape, Congress has asked a lot of CISA from day one and expected it to succeed. The reality is that CISA is still a young agency, it was created in 2018, and since then it has grown exponentially,\u201d he said, later adding: \u201cWe need to take a step back and allow CISA to get a handle on their new responsibilities and ask pointed, productive questions about its efforts.\u201d<\/p>\n<p>Those sentiments were largely echoed by ranking Democrat on the subcommittee, Rep. Eric Swalwell, D-Calif., who noted that even before CISA took on some of these new authorities and tasks, their plate was already full with existing responsibilities to assist federal agencies in their own cybersecurity efforts, engage with private industry and critical infrastructure, help secure elections and surge resources to meet emergent, cross sector threats like SolarWinds and Log4J.<\/p>\n<p>\u201cWhile CISA pursues the ambitious agenda set by its leadership, it must also effectively execute its existing obligations, including to promote the great training and educational resources \u2026 that are widely utilized across industries,\u201d he said.<\/p>\n<h2>New work mixed with unfinished business<\/h2>\n<p>In particular, Swalwell expressed concern that while the JCDC \u2014 which puts CISA, other federal agencies and members of industry in the same room to develop solutions to systemic cybersecurity problems \u2014 often gets rave reviews from industry, it still operates in a somewhat opaque fashion. Swalwell plans to introduce legislation in the coming weeks to bring more transparency around the collaborative\u2019s work, as well as its process for adding new members.<\/p>\n<p>\u201cJCDC had existed for a year and a half without a charter or concrete criteria for membership, all of which are essential&#8230;and a number of people have asked me: \u2018how do we get into JCDC?\u2019\u201d he said.<\/p>\n<p>The notion that CISA\u2019s plate may be fuller than its appetite \u2014 or resourcing \u2013 may be partially backed up by a pair of reports this month from the Government Accountability Office, Congress\u2019 oversight arm over federal agencies.<\/p>\n<p>One of those <a rel=\"noreferrer noopener\" href=\"https:\/\/www.gao.gov\/products\/gao-22-104279\" target=\"_blank\">reports<\/a> found that the National Critical Infrastructure Prioritization Program, which was created after 9\/11 and is supposed to be used by CISA to prioritize support to high-value systems and assets that would cause cascading effects across American society if disrupted, is so old that it doesn\u2019t substantively cover cybersecurity threats, CISA\u2019s main mission.<\/p>\n<p>Further, GAO investigators found that \u201cnearly all federal and state officials we spoke with questioned the program&#8217;s relevance and usefulness.\u201d The agency completed another initiative, mapping national critical functions, and is currently working on a separate initiative called the Systemically Important Critical Infrastructure list, that are designed to address many of the same core questions.<\/p>\n<p>Another report found that while CISA helps oversee and guide the work of other sector risk management agencies around protecting critical infrastructure from both physical and cyber threats, there are a number of pressing tasks \u2014 like updating <a href=\"https:\/\/www.cisa.gov\/resources-tools\/resources\/presidential-policy-directive-ppd-21-critical-infrastructure-security-and\">Presidential Policy Directive 21<\/a> (which deals with critical infrastructure security), re-writing the <a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/national-infrastructure-protection-plan-and-resources\">National Infrastructure Protection Plan<\/a> and refreshing individual plans for all 16 critical infrastructure sector \u2014 that are not being governed by clear timelines or milestones.<\/p>\n<p>Tina Won Sherman, director of critical infrastructure protection and transportation security at GAO, told the panel that it\u2019s not clear whether CISA\u2019s maturity has kept pace with it\u2019s growing budget, and highlighted a range of activities CISA could undertake to improve cybersecurity coordination between themselves, sector risk management agencies and the industries they cover.<\/p>\n<p>\u201cFor example, CISA does not have a standardized approach for agencies to estimate costs, or make requests for resources, does not consistently measure the maturity and effectiveness of the agencies, has created but not yet filled liaison positions with them and does not obtain regular feedback on their partnerships,\u201d said Sherman.<\/p>\n<p>In a letter attached to one of the reports, the department\u2019s GAO liaison Jim Crumpacker said the agency concurred with all six recommendations and planned to have them all completed by the end of October later this year.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34460\/House-Leaders-Dont-Want-CISAs-Reach-To-Exceed-Its-Grasp.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51171,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[372],"class_list":["post-51170","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>House Leaders Don&#039;t Want CISA&#039;s Reach To Exceed Its Grasp 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"House Leaders Don&#039;t Want CISA&#039;s Reach To Exceed Its Grasp 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-24T16:08:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/030223_cisa.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"House Leaders Don&#8217;t Want CISA&#8217;s Reach To Exceed Its Grasp\",\"datePublished\":\"2023-03-24T16:08:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/\"},\"wordCount\":992,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg\",\"keywords\":[\"headline,government,usa\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/\",\"name\":\"House Leaders Don't Want CISA's Reach To Exceed Its Grasp 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg\",\"datePublished\":\"2023-03-24T16:08:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg\",\"width\":1200,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusa\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"House Leaders Don&#8217;t Want CISA&#8217;s Reach To Exceed Its Grasp\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"House Leaders Don't Want CISA's Reach To Exceed Its Grasp 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/","og_locale":"en_US","og_type":"article","og_title":"House Leaders Don't Want CISA's Reach To Exceed Its Grasp 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-24T16:08:48+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/030223_cisa.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"House Leaders Don&#8217;t Want CISA&#8217;s Reach To Exceed Its Grasp","datePublished":"2023-03-24T16:08:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/"},"wordCount":992,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg","keywords":["headline,government,usa"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/","url":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/","name":"House Leaders Don't Want CISA's Reach To Exceed Its Grasp 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg","datePublished":"2023-03-24T16:08:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp.jpg","width":1200,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/house-leaders-dont-want-cisas-reach-to-exceed-its-grasp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusa\/"},{"@type":"ListItem","position":3,"name":"House Leaders Don&#8217;t Want CISA&#8217;s Reach To Exceed Its Grasp"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51170"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51170\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51171"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}