{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
The SEC released its final rule on Cybersecurity Risk Management, Strategy, Governance and Incident Disclosure on July 26, 2023. With this new rule, the SEC puts the onus on companies to give investors current, consistent and decision-useful information about how they manage their cyber risks.
Everyone in charge of upholding the confidentiality, integrity and availability of their company’s information systems should take heed. This responsibility often falls under the chief information security officer (CISO), chief information officer (CIO) and/or chief technology officer (CTO) at SEC registrants.
Disclosing the existence of a material cyber incident is not a new requirement. What’s new is the specificity of the what, how, when and where to disclose a material cyber incident. This will increase the CISO’s, CIO’s and CTO’s responsibilities.
Report “material” cybersecurity incidents on a Form 8-K within four business days of materiality determination.
Describe the nature, scope, and timing of the incident and the material impact or reasonably likely material impact on the registrant. To the extent required information is not determined or is unavailable at the time of the filing, the 8-K should include disclosure of this fact, and the 8-K should be later amended when the information is determined or becomes available.
Materiality determination should be based on federal securities law materiality, including consideration of quantitative and qualitative factors.
Effective date: The material incident disclosure requirements would be effective on or after December 18, 2023. Smaller reporting companies have a 180-day deferral.
Describe the company’s process, if any, for assessing, identifying, and managing material risks from cybersecurity threats, including:
Effective date: Disclosures for risk management, strategy and governance would be effective for all registrants for fiscal years ending on or after December 15, 2023.
Describe the company’s governance of cybersecurity risks as it relates to:
Effective date: Disclosures for risk management, strategy and governance would be effective for all registrants for fiscal years ending on or after December 15, 2023.
CISOs wonder what they’re ultimately responsible for to comply with the new rule. They’re asking, Am I effectively making materiality determinations when I decide what gets escalated? Are materiality considerations part of my escalation criterion? What should I do to make sure that disclosures in 10Ks regarding cybersecurity are accurate? What can I do to help reduce the company’s exposure to compliance risks?
Even if your compliance plan is in place, here are three areas you’ll want to double-check.
Managing cyber risks is one thing. Being able to disclose the way you manage them to the public in financial statements is quite another. You should determine how well your company’s cybersecurity program can deliver on its mission in line with the SEC’s final rule.
Ask yourselves the questions in How well do you understand your company’s cyber risk posture and risk management program? If your answer to any of the questions is no or not sure, then you may need to make immediate improvements to support more stringent disclosure statements.
Even if you’re able to respond to these questions with a resounding yes, there may be room for improvement. It’s helpful to think ahead about how your practices stack up against your peers and competitors once consistent and comparable disclosures become available to investors.
Determining materiality is not the sole responsibility of any one person. It will be a stress test of how well you communicate and coordinate with others to make materiality judgments about cyber incident reporting. Here’s what you should do to be prepared.
You’ll have many stakeholders needing you to provide information.
As recent SEC enforcement actions suggest, companies that don’t comply with the new rule will likely face serious consequences. The commission has levied large fines against companies for not disclosing breaches sufficiently or in a timely manner. It continues to use a two-pronged approach to enforcement. First, that companies have appropriate disclosures under the requirements and, second, that they have controls and procedures in place to escalate necessary items for determination of whether disclosures are required.
CISOs will be integral to real-time responses to cyber incidents and preparing the required SEC disclosures. They should be at the center of a multifunctional team that can be ready to jump into action.