{"id":9873,"date":"2024-04-12T08:00:42","date_gmt":"2024-04-12T15:00:42","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9873"},"modified":"2024-05-29T08:18:32","modified_gmt":"2024-05-29T15:18:32","slug":"circia-does-cyber-incident-reporting-apply-to-you","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/","title":{"rendered":"CIRCIA: Does Cyber Incident Reporting Apply to You?"},"content":{"rendered":"<p><i style=\"font-size:14px;\">Disclaimer: This blog offers general information and should not be considered legal advice. Consult your own legal counsel for specific advice.<\/i><\/p>\n<p>The <a href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/information-sharing\/cyber-incident-reporting-critical-infrastructure-act-2022-circia\" rel=\"noopener\" target=\"_blank\">Cyber Incident Reporting for Critical Infrastructure Act of 2022<\/a> (CIRCIA) was signed into law by President Biden in 2022. Its goal is to strengthen the cybersecurity posture of the United States by establishing more robust incident reporting requirements for critical infrastructure entities. A key requirement of CIRCIA is for the <a href=\"https:\/\/www.cisa.gov\/\" rel=\"noopener\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency<\/a> (CISA) to develop regulations to implement the law.<\/p>\n<p>On <strong>April 4, 2024<\/strong>, CISA published a <a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/04\/04\/2024-06526\/cyber-incident-reporting-for-critical-infrastructure-act-circia-reporting-requirements\" rel=\"noopener\" target=\"_blank\">Notice of Proposed Rulemaking<\/a> (NPRM), setting out such proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.<\/p>\n<h3>Who is in Scope for Reporting?<\/h3>\n<p>Covered entities include any organization within critical infrastructure sectors that exceed small business size standards (based on industry-specific <a href=\"https:\/\/www.ecfr.gov\/current\/title-13\/chapter-I\/part-121\" rel=\"noopener\" target=\"_blank\">SBA standards<\/a>) and any entity, regardless of size, that falls into proposed sector-based criteria within a critical infrastructure sector. CISA estimates that upwards of 316,000 organizations will be considered &#8220;covered entities&#8221; under this rule.<\/p>\n<p>The critical infrastructure sectors include:<\/p>\n<ul>\n<li>Chemical<\/li>\n<li>Commercial Facilities<\/li>\n<li>Communications<\/li>\n<li>Critical Manufacturing<\/li>\n<li>Dams<\/li>\n<li>Defense Industrial Base<\/li>\n<li>Emergency Services<\/li>\n<li>Energy<\/li>\n<li>Financial Services<\/li>\n<li>Food and Agriculture<\/li>\n<li>Government Facilities<\/li>\n<li>Healthcare and Public Health<\/li>\n<li>Information Technology<\/li>\n<li>Nuclear Reactors, Materials, and Waste<\/li>\n<li>Transportation Systems<\/li>\n<li>Water and Wastewater Systems<\/li>\n<\/ul>\n<p>CISA referenced the <a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2013\/02\/12\/presidential-policy-directive-critical-infrastructure-security-and-resil\/\" rel=\"noopener\" target=\"_blank\">Presidential Policy Directive 21<\/a> for the list of these 16 critical infrastructure sectors. It elected not to propose sector-specific criteria for 3 sectors (Commercial Facilities, Dams, and Food &#038; Agriculture).  Organizations that don&#8217;t exceed the small business standards could still be subject to the rule if they meet one or more sector-specific criteria across the other 13 critical infrastructure sectors. For example, Information Technology companies providing IT hardware, software systems, or services to the federal government would fall within the requirements regardless of their size.  CISA intends to publish additional guidance with the final rule to help organizations better understand whether they are part of a critical infrastructure sector. <\/p>\n<h3>What Triggers a Report?<\/h3>\n<p>A covered cyber incident is defined as a cyber incident that leads to any of the following impacts:<\/p>\n<ol>\n<li>Substantial loss of confidentiality, integrity, or availability of a covered entity&#8217;s information system or network.<\/li>\n<li>Serious impact on the safety and resiliency of a covered entity&#8217;s operational systems and processes.<\/li>\n<li>Disruption of a covered entity&#8217;s ability to engage in business or industrial operations or deliver goods or services.<\/li>\n<li>Unauthorized access to a covered entity&#8217;s information system or network, or any nonpublic information contained therein, facilitated through or caused by a compromise of a cloud service provider, managed service provider, or other third-party data hosting provider, or by a supply chain compromise.<\/li>\n<\/ol>\n<p>Covered entities that make a ransomware payment must also report.<\/p>\n<h3>Reporting Timelines<\/h3>\n<p>Under the proposed rule, covered entities will be required to report to CISA within 72 hours after they reasonably believe a covered cyber incident has occurred, and within 24 hours after a ransomware payment is disbursed. There are also requirements to update these reports.<\/p>\n<p>CISA is proposing a web-based &#8220;CIRCIA Incident Reporting Form&#8221; that they plan to make available. The report must include specific types and categories of information relating to the incident, depending on whether it is a Covered Cyber Incident Report or a Ransom Payment Report.<\/p>\n<p>CISA indicates it will work with other federal agencies to find opportunities to reduce duplicative reporting by allowing organizations required to report similar information in similar timeframes to avoid reporting it again under CIRCIA.<\/p>\n<p>Acknowledging the often-sensitive nature of these reports, the proposed rule states that a covered entity will not be required to waive applicable privilege or protection by submitting a report, and such reports are not subject to disclosure under public records laws such as the Freedom of Information Act.<\/p>\n<h3>Preparing for Compliance<\/h3>\n<p>Companies subject to the proposed rule should take several steps to prepare for it to become final:<\/p>\n<ol>\n<li><strong>Stay Informed<\/strong>: Regularly monitor updates from CISA regarding the rulemaking process, and the final rule when it\u2019s published. Understand the reporting requirements and timelines.<\/li>\n<li><strong>Review Incident Response Plans<\/strong>: Evaluate existing incident response plans and ensure they align with the reporting requirements.  Be prepared to update procedures to include timely reporting of covered cyber incidents and ransomware payments within the required timeframes.<\/li>\n<li><strong>Incident Detection and Monitoring<\/strong>: Strengthen monitoring tools and processes to detect cyber incidents promptly (or ideally prevent them from happening at all).<\/li>\n<ul>\n<li style=\" list-style-type: disc; \"><em>Data Gathering<\/em>: Ensure your tools are collecting detailed information about your systems and environment to enhance your ability to prevent or detect cyber incidents, and to use for reporting purposes.<\/li>\n<\/ul>\n<li><strong>Vendor and Third-Party Agreements<\/strong>:<\/li>\n<ul>\n<li style=\" list-style-type: disc; \"><em>Review Contracts<\/em>: Evaluate agreements with vendors and third parties to ensure alignment with reporting obligations.<\/li>\n<li style=\" list-style-type: disc; \"><em>Include Reporting Clauses<\/em>: Consider adding clauses requiring timely incident reporting in contracts.<\/li>\n<\/ul>\n<li><strong>Voluntary Sharing of Information<\/strong>: While reporting under CIRCIA is not mandatory until the final rule goes into effect, consider voluntarily sharing information about cyber incidents with CISA.<br \/>\n<a href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/information-sharing\/cyber-incident-reporting-critical-infrastructure-act-2022-circia\" rel=\"noopener\" target=\"_blank\">Early sharing helps prevent other organizations from falling victim to similar incidents and aids in identifying trends.<\/a><\/li>\n<\/ol>\n<p>Remember that CISA\u2019s proposed rule is open for public comment until <strong>June 3, 2024<\/strong>. <a href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/information-sharing\/cyber-incident-reporting-critical-infrastructure-act-2022-circia\" rel=\"noopener\" target=\"_blank\">Organizations can provide feedback during this period, which will be considered in developing the Final Rule<\/a>. <\/p>\n<p>Infoblox SOC Insights allows customers to identify, monitor, and analyze threat actors and their activities on their networks. For more information, click <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\" rel=\"noopener\" target=\"_blank\">here<\/a> or contact an Infoblox representative.<\/p>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">CIRCIA<\/span>: Does Cyber Incident Reporting Apply to You?');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Disclaimer: This blog offers general information and should not be considered legal advice. Consult your own legal counsel for specific advice. The Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) was signed into law by President Biden in 2022. Its goal is to strengthen the cybersecurity posture of the United States by establishing [&hellip;]<\/p>\n","protected":false},"author":396,"featured_media":7548,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[228,997,334,1013,189,576],"class_list":{"0":"post-9873","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone-threat-defense","9":"tag-soc-insights","10":"tag-cisa","11":"tag-circia","12":"tag-cybersecurity","13":"tag-compliance","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox<\/title>\n<meta name=\"description\" content=\"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox\" \/>\n<meta property=\"og:description\" content=\"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-12T15:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T15:18:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"363\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chris Herbst\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Herbst\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/\"},\"author\":{\"name\":\"Chris Herbst\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ceb45ce0159904e9999dddb6737bca4b\"},\"headline\":\"CIRCIA: Does Cyber Incident Reporting Apply to You?\",\"datePublished\":\"2024-04-12T15:00:42+00:00\",\"dateModified\":\"2024-05-29T15:18:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/\"},\"wordCount\":914,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image-34.jpg\",\"keywords\":[\"BloxOne\u00ae Threat Defense\",\"SOC Insights\",\"CISA\",\"CIRCIA\",\"Cybersecurity\",\"compliance\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/\",\"name\":\"CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image-34.jpg\",\"datePublished\":\"2024-04-12T15:00:42+00:00\",\"dateModified\":\"2024-05-29T15:18:32+00:00\",\"description\":\"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image-34.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image-34.jpg\",\"width\":612,\"height\":363,\"caption\":\"Virus detected alert. Camera moves around hud display and man typing keyboard. Cyber security breach warning with worm symbol on screen. System protection futuristic concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/circia-does-cyber-incident-reporting-apply-to-you\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CIRCIA: Does Cyber Incident Reporting Apply to You?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ceb45ce0159904e9999dddb6737bca4b\",\"name\":\"Chris Herbst\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_396_1712856556-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_396_1712856556-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_396_1712856556-96x96.png\",\"caption\":\"Chris Herbst\"},\"description\":\"Chris is a seasoned technology attorney and leader. His role at Infoblox spans across pivotal areas including Product, Engineering, IP, Privacy, Marketing, and Procurement, where he leverages his extensive experience to guide Infoblox through the evolving legal landscape. With a career that has seen notable roles at VMware, Broadcom, CA Technologies, and IBM, Chris's journey is one of continual learning and adaptation. His Computer Science degree, complemented by ScrumMaster (CSM) and Information Privacy Technologist (CIPT) certifications, helps him to bridge the gap between the technical and legal worlds. LinkedIn Profile\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/chris-herbst\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox","description":"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/","og_locale":"en_US","og_type":"article","og_title":"CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox","og_description":"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/","og_site_name":"Infoblox Blog","article_published_time":"2024-04-12T15:00:42+00:00","article_modified_time":"2024-05-29T15:18:32+00:00","og_image":[{"width":612,"height":363,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg","type":"image\/jpeg"}],"author":"Chris Herbst","twitter_card":"summary_large_image","twitter_title":"CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox","twitter_description":"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg","twitter_misc":{"Written by":"Chris Herbst","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/"},"author":{"name":"Chris Herbst","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ceb45ce0159904e9999dddb6737bca4b"},"headline":"CIRCIA: Does Cyber Incident Reporting Apply to You?","datePublished":"2024-04-12T15:00:42+00:00","dateModified":"2024-05-29T15:18:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/"},"wordCount":914,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg","keywords":["BloxOne\u00ae Threat Defense","SOC Insights","CISA","CIRCIA","Cybersecurity","compliance"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/","url":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/","name":"CIRCIA: Does Cyber Incident Reporting Apply to You? | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg","datePublished":"2024-04-12T15:00:42+00:00","dateModified":"2024-05-29T15:18:32+00:00","description":"On April 4, 2024, CISA published a Notice of Proposed Rulemaking (NPRM), setting out proposed regulations and seeking public input. Unless the comment period is extended, the public will have 60 days to submit written comments, and CISA will have 18 months to issue a final rule, which is anticipated to come into effect in early 2026.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image-34.jpg","width":612,"height":363,"caption":"Virus detected alert. Camera moves around hud display and man typing keyboard. Cyber security breach warning with worm symbol on screen. System protection futuristic concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/circia-does-cyber-incident-reporting-apply-to-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"CIRCIA: Does Cyber Incident Reporting Apply to You?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ceb45ce0159904e9999dddb6737bca4b","name":"Chris Herbst","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_396_1712856556-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_396_1712856556-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_396_1712856556-96x96.png","caption":"Chris Herbst"},"description":"Chris is a seasoned technology attorney and leader. His role at Infoblox spans across pivotal areas including Product, Engineering, IP, Privacy, Marketing, and Procurement, where he leverages his extensive experience to guide Infoblox through the evolving legal landscape. With a career that has seen notable roles at VMware, Broadcom, CA Technologies, and IBM, Chris's journey is one of continual learning and adaptation. His Computer Science degree, complemented by ScrumMaster (CSM) and Information Privacy Technologist (CIPT) certifications, helps him to bridge the gap between the technical and legal worlds. LinkedIn Profile","url":"https:\/\/www.infoblox.com\/blog\/author\/chris-herbst\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9873"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9873\/revisions"}],"predecessor-version":[{"id":9878,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9873\/revisions\/9878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7548"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}