

 
 INSIGHTi 
 
Harmonic Dissonance—Synching Up 
Cybersecurity Regulations 
July 31, 2023 
On July 19, 2023, the Office of the National Cyber Director (ONCD) announced that it will start a process 
to harmonize cybersecurity regulations and seek regulatory reciprocity. In this pursuit, the White House 
released a Request for Information (RFI) seeking input from stakeholders on the regulations their 
industries and entities face, challenges they encounter in meeting those regulations, and potential gaps 
that exist.  
This endeavor initiates an objective from the March 2023 National Cybersecurity Strategy and its 
implementation plan.  
Efforts surrounding regulatory harmonization have been lauded by some Members of Congress and 
explored by congressional committees in the past. Yet, attempts to achieve regulatory alignment have 
been fruitless. Even after the ONCD’s announcement, the Securities and Exchange Commission (SEC) 
announced that it adopted a new rule requiring publicly traded companies to disclose cybersecurity 
incidents to investors. This action front-runs similar disclosure rules that the Cybersecurity and 
Infrastructure Security Agency (CISA) is required to issue per the Cyber Incident Reporting for Critical 
Infrastructure Act of 2022 (CIRCIA), but are still in development.  
This Insight discusses cybersecurity regulations, their harmonization, and options for Congress.  
Cybersecurity Regulations 
Prior to CIRCIA, the U.S. government did not have broadly applicable cybersecurity regulations. Instead, 
Congress and agencies established rules for cybersecurity sectorally—that is, agencies regulated specific 
sectors independently for specific purposes. Some, but not all, sectors are regulated for cybersecurity in 
some way. Most common among these regulations is the requirement to report incidents. For example, 
defense contractors, bulk electric system providers, financial depository institutions, health care facilities, 
nuclear power licensees, and transportation facilities all have responsibilities to report to a federal agency 
(or approved entity) when they experience cyber incidents. Some of these entities also have requirements 
for planning cybersecurity response activities, implementing mitigation strategies, and assigning 
responsibilities for cybersecurity to a facility’s officer.  
Congressional Research Service 
https://crsreports.congress.gov 
IN12211 
CRS INSIGHT 
Prepared for Members and  
 Committees of Congress 
 
  
 
Congressional Research Service 
2 
The SEC rule is unique in the breadth of its applicability—all publicly traded companies, regardless of 
sector or other reporting requirements. The SEC’s view is that cybersecurity risk must be assessed and 
disclosed to investors and that cyber incidents constitute material events. Previously, cybersecurity 
incidents were not largely considered material events, with a handful of incidents meeting that threshold 
(e.g., the Equifax Breach). The SEC’s rule creates repetitive reporting requirements with the pending 
CIRCIA and existing sectoral rules.  
In addition to federal regulation, private sector companies are also subject to numerous rules imposed by 
state regulatory agencies. There is no obligation for regulatory agencies to coordinate or deconflict their 
efforts, leading to some frustration within firms.  
Individual entities may concurrently be subject to the CIRCIA rule, SEC rules, and sectoral rules. These 
requirements may compel the same information to be repeatedly disclosed to different regulators. The 
costs associated with regulatory compliance have been cited by some industry groups as burdensome.  
Harmonizing Regulations 
Recognizing the challenges in harmonizing regulations, the ONCD is pursuing a variety of options. The 
RFI is open for public comment until mid-September 2023, and ONCD officials have suggested that 
harmonization efforts will be a multi-year process. First, the ONCD plans to solicit feedback and develop 
a framework for regulatory harmonization. Two framework options the ONCD is already considering are 
the application of regulations in a tiered manner (e.g., aligning requirements to existing business size to 
allow small and medium businesses flexibility) and pursing reciprocity among agencies for issued 
regulations (rather than attempting to harmonize those regulations).  
In its March 2020 report, the Cyberspace Solarium Commission acknowledged the tension between 
burdensome regulations and the utility of regulations in improving cybersecurity outcomes. Ultimately, 
the Commission did not make a recommendation regarding harmonization, partly because of the 
challenges in doing so.  
Councils for pursuing regulatory harmonization existed prior to and after the Commission’s review. In 
both cases, noticeable progress towards harmonization have not been publicly observed or achieved. 
•  The Cybersecurity Forum for Independent and Executive Branch Regulators existed before the 
Commission. According to its charter, the body, then chaired by the Nuclear Regulatory 
Commission, sought to “increase the overall effectiveness and consistency of regulatory 
authorities’ cybersecurity efforts.” It has since been revitalized under the leadership of the Federal 
Communications Commission.  
•  The National Cybersecurity Strategy proposes using the CIRCIA-created Cyber Incident 
Reporting Council (CIRC) to coordinate and advance common standards and deconflict the 
variety of federal cyber incident reporting requirements. While this is a responsibility given to the 
CIRC in its authorizing legislation, the law does not provide new regulatory authority, nor does it 
extend to other cybersecurity regulations (e.g., minimum standards and planning requirements).  
Considerations for Congress 
After Congress determines that a regulation is needed, authority to regulate is usually granted in a three-
step framework. First, an authorized entity would create the regulation which industry must follow. This 
is also called rulemaking. Next, an agency could examine or supervise for compliance with the regulation. 
If a company is found to be not in compliance with the regulation, an agency could enforce the regulation 
(e.g., suing the company or issuing a fine). Congress may grant authority to different agencies for each
  
Congressional Research Service 
3 
step in this framework. Critical to this framework is that regulation be independent of other agency 
authorities and activities.  
Regulatory independence has been a key tenet of rulemaking, but also contributes to challenges in 
achieving harmonization. It is unclear what requirement or incentive that regulatory agencies have to 
issue, alter, or remove regulations to align with another’s. 
Congress may choose to monitor these harmonization efforts in an effort to oversee their success. 
Congress may face a question of granting new and explicit authorities for issuing regulations or directing 
an agency to change existing regulations. Congress may also choose to explicitly authorize an office, 
agency, or council with the responsibility for ensuring that cybersecurity regulations are harmonized (or 
reciprocal) and empowering that body with the authorities necessary to ensure that it can happen. 
Congress can also choose to direct regulatory agencies to change their regulations to harmonize or 
reciprocate with others.  
In pursuing any of these options, current ONCD efforts to explore harmonization could inform future 
congressional action.  
 
Author Information 
 
Chris Jaikaran 
   
Specialist in Cybersecurity Policy 
 
 
 
 
Disclaimer 
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff 
to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of 
Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of 
information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role. 
CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United 
States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However, 
as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the 
permission of the copyright holder if you wish to copy or otherwise use copyrighted material. 
 
IN12211 · VERSION 1 · NEW