The three steps you need to take now if you’re in charge of IT and security in your company
CISOs wonder what they’re ultimately responsible for to comply with the new rule. They’re asking, Am I effectively making materiality determinations when I decide what gets escalated? Are materiality considerations part of my escalation criterion? What should I do to make sure that disclosures in 10Ks regarding cybersecurity are accurate? What can I do to help reduce the company’s exposure to compliance risks?
Even if your compliance plan is in place, here are three areas you’ll want to double-check.
1. Understand your risk posture alongside your cybersecurity management program’s capabilities and constraints.
Managing cyber risks is one thing. Being able to disclose the way you manage them to the public in financial statements is quite another. You should determine how well your company’s cybersecurity program can deliver on its mission in line with the SEC’s final rule.
Ask yourselves the questions in How well do you understand your company’s cyber risk posture and risk management program? If your answer to any of the questions is no or not sure, then you may need to make immediate improvements to support more stringent disclosure statements.
Even if you’re able to respond to these questions with a resounding yes, there may be room for improvement. It’s helpful to think ahead about how your practices stack up against your peers and competitors once consistent and comparable disclosures become available to investors.
2. Understand your company’s materiality framework and your ability to provide the right inputs.
Determining materiality is not the sole responsibility of any one person. It will be a stress test of how well you communicate and coordinate with others to make materiality judgments about cyber incident reporting. Here’s what you should do to be prepared.
- Establish an organized process to work with the appropriate individuals involved in materiality determinations.
- Help define and develop a materiality policy at the enterprise level.
- Expand the incident response process to include tracking of incident attributes and metadata needed for establishing materiality.
- Establish a repeatable, structured method for consistent reporting of incident metadata required to establish materiality.